Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO454355 Pdf.exe

Overview

General Information

Sample name:PO454355 Pdf.exe
Analysis ID:1466132
MD5:2d8c7cd70698ef3b6d1a3e042de0a93a
SHA1:c73700a78a391e61b9ca3535c8d26dde12035808
SHA256:657f1fddc9566fb412981480dcc6f6600219c6e5ca756070fe5b15baaa3843ce
Tags:exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
One or more processes crash
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • PO454355 Pdf.exe (PID: 5072 cmdline: "C:\Users\user\Desktop\PO454355 Pdf.exe" MD5: 2D8C7CD70698EF3B6D1A3E042DE0A93A)
    • conhost.exe (PID: 4980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • csc.exe (PID: 4932 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
      • WerFault.exe (PID: 1588 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 20 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:07/02/24-15:46:31.893078
SID:2856318
Source Port:62736
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PO454355 Pdf.exeReversingLabs: Detection: 44%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: PO454355 Pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rbx0_2_00007FF6E8D21C50
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rbx0_2_00007FF6E8D21C50
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rdi0_2_00007FF6E8DE3D20
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rbx0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rbx0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rbx0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rbx0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rbx0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rbx0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rsi0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push rdi0_2_00007FF6E8DADD30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 4x nop then push r140_2_00007FF6E8E5D7E0

Networking

barindex
Source: TrafficSnort IDS: 2856318 ETPRO TROJAN FormBook CnC Checkin (POST) M4 192.168.2.4:62736 -> 3.33.244.179:80
Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
Source: PO454355 Pdf.exeString found in binary or memory: https://aka.ms/GlobalizationInvariantMode
Source: PO454355 Pdf.exeString found in binary or memory: https://aka.ms/nativeaot-c
Source: PO454355 Pdf.exe, 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://aka.ms/nativeaot-compatibility
Source: PO454355 Pdf.exeString found in binary or memory: https://aka.ms/nativeaot-compatibilityY
Source: PO454355 Pdf.exeString found in binary or memory: https://aka.ms/nativeaot-compatibilityy
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D521B00_2_00007FF6E8D521B0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D538B00_2_00007FF6E8D538B0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D531E00_2_00007FF6E8D531E0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D381F00_2_00007FF6E8D381F0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D239D00_2_00007FF6E8D239D0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D571B00_2_00007FF6E8D571B0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D529B00_2_00007FF6E8D529B0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D54B100_2_00007FF6E8D54B10
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D282D00_2_00007FF6E8D282D0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D402A00_2_00007FF6E8D402A0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D39A900_2_00007FF6E8D39A90
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D4BC800_2_00007FF6E8D4BC80
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D46C900_2_00007FF6E8D46C90
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D554900_2_00007FF6E8D55490
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D3D6200_2_00007FF6E8D3D620
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D41D600_2_00007FF6E8D41D60
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D33EF00_2_00007FF6E8D33EF0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D2B6F00_2_00007FF6E8D2B6F0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D26ED00_2_00007FF6E8D26ED0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D567E00_2_00007FF6E8D567E0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D4C7D00_2_00007FF6E8D4C7D0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D417B40_2_00007FF6E8D417B4
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D2BF900_2_00007FF6E8D2BF90
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8DD7F400_2_00007FF6E8DD7F40
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D331300_2_00007FF6E8D33130
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D5E8E00_2_00007FF6E8D5E8E0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D558C00_2_00007FF6E8D558C0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D4C0A00_2_00007FF6E8D4C0A0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D320800_2_00007FF6E8D32080
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: String function: 00007FF6E8D2DBD0 appears 64 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 20
Source: PO454355 Pdf.exeBinary or memory string: OriginalFilename vs PO454355 Pdf.exe
Source: PO454355 Pdf.exe, 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIFormattableGetEnumNames.dllR vs PO454355 Pdf.exe
Source: PO454355 Pdf.exeBinary or memory string: OriginalFilenameIFormattableGetEnumNames.dllR vs PO454355 Pdf.exe
Source: PO454355 Pdf.exeStatic PE information: Section: .rsrc ZLIB complexity 0.996648656542056
Source: classification engineClassification label: mal72.evad.winEXE@5/5@1/0
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D32F60 LookupPrivilegeValueW,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLargePageMinimum,VirtualAlloc,GetCurrentProcess,VirtualAllocExNuma,0_2_00007FF6E8D32F60
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4980:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4932
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2c83fdca-92d8-417c-9c3e-a3d64b15695cJump to behavior
Source: PO454355 Pdf.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\PO454355 Pdf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PO454355 Pdf.exeReversingLabs: Detection: 44%
Source: C:\Users\user\Desktop\PO454355 Pdf.exeFile read: C:\Users\user\Desktop\PO454355 Pdf.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\PO454355 Pdf.exe "C:\Users\user\Desktop\PO454355 Pdf.exe"
Source: C:\Users\user\Desktop\PO454355 Pdf.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PO454355 Pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 20
Source: C:\Users\user\Desktop\PO454355 Pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeSection loaded: profapi.dllJump to behavior
Source: PO454355 Pdf.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: PO454355 Pdf.exeStatic file information: File size 2404352 > 1048576
Source: PO454355 Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: PO454355 Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: PO454355 Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: PO454355 Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PO454355 Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: PO454355 Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: PO454355 Pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: PO454355 Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PO454355 Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PO454355 Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PO454355 Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PO454355 Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PO454355 Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\PO454355 Pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
Source: C:\Users\user\Desktop\PO454355 Pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
Source: PO454355 Pdf.exeStatic PE information: section name: .managed
Source: PO454355 Pdf.exeStatic PE information: section name: hydrated
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeMemory allocated: 22E8B970000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-16396
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D32B90 GetSystemInfo,GetNumaHighestNodeNumber,GetCurrentProcess,GetProcessGroupAffinity,GetLastError,GetCurrentProcess,GetProcessAffinityMask,0_2_00007FF6E8D32B90
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: PO454355 Pdf.exeBinary or memory string: qEMutating a value collection derived from a dictionary is not allowed.Y
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D28130 RtlAddVectoredExceptionHandler,RaiseFailFastException,0_2_00007FF6E8D28130
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D8B70C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6E8D8B70C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\PO454355 Pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 400000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 400000Jump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 401000Jump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4EE0008Jump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D8BDA4 cpuid 0_2_00007FF6E8D8BDA4
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: GetLocaleInfoEx,0_2_00007FF6E8DF0D30
Source: C:\Users\user\Desktop\PO454355 Pdf.exeCode function: 0_2_00007FF6E8D8BA10 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6E8D8BA10
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Access Token Manipulation
2
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts311
Process Injection
1
Access Token Manipulation
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
311
Process Injection
Security Account Manager2
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS23
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1466132 Sample: PO454355 Pdf.exe Startdate: 02/07/2024 Architecture: WINDOWS Score: 72 17 15.164.165.52.in-addr.arpa 2->17 19 Snort IDS alert for network traffic 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 AI detected suspicious sample 2->23 8 PO454355 Pdf.exe 1 2->8         started        signatures3 process4 signatures5 25 Writes to foreign memory regions 8->25 27 Allocates memory in foreign processes 8->27 29 Injects a PE file into a foreign processes 8->29 11 csc.exe 8->11         started        13 conhost.exe 8->13         started        process6 process7 15 WerFault.exe 23 18 11->15         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PO454355 Pdf.exe45%ReversingLabsWin64.Trojan.Stealerc
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://aka.ms/GlobalizationInvariantMode0%Avira URL Cloudsafe
https://aka.ms/nativeaot-c0%Avira URL Cloudsafe
https://aka.ms/nativeaot-compatibilityY0%Avira URL Cloudsafe
https://aka.ms/nativeaot-compatibility0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
15.164.165.52.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.6.drfalse
    • URL Reputation: safe
    unknown
    https://aka.ms/GlobalizationInvariantModePO454355 Pdf.exefalse
    • Avira URL Cloud: safe
    unknown
    https://aka.ms/nativeaot-cPO454355 Pdf.exefalse
    • Avira URL Cloud: safe
    unknown
    https://aka.ms/nativeaot-compatibilityPO454355 Pdf.exe, 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://aka.ms/nativeaot-compatibilityYPO454355 Pdf.exefalse
    • Avira URL Cloud: safe
    unknown
    https://aka.ms/nativeaot-compatibilityyPO454355 Pdf.exefalse
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1466132
      Start date and time:2024-07-02 15:57:00 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 41s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:PO454355 Pdf.exe
      Detection:MAL
      Classification:mal72.evad.winEXE@5/5@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.73.29
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: PO454355 Pdf.exe
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.5800896353847202
      Encrypted:false
      SSDEEP:96:OaFN19bsQhMov7JYqQXIDcQ4c6fcE+cw3tZAX/d5FMT2SlPkpXmTAhf/VXT5NHBg:dH19bk0WbkQzuiFJZ24IO8b
      MD5:31C96EDEB094B400D4C2DFDF5AADB2AC
      SHA1:E7B71D49B1D2061F81A97EF6FD3A62081553DF68
      SHA-256:061EE7EC848071B822485A6264EF1B24AF2C0969D24423F7DA86DEE33F6F1C62
      SHA-512:B3887771904A9A848E7201505F050520AF7093D8EC73948AEF927037CDE29B2D91CC7789B7DE61472BFAE1F2BBC34C4D36E644F596B0BA54C1D661CAA0C71687
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.4.0.2.2.7.4.6.5.5.3.2.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.4.0.2.2.7.9.0.1.4.7.0.4.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.e.8.9.f.c.3.0.-.2.6.6.5.-.4.7.d.9.-.b.3.d.6.-.2.c.5.1.7.3.e.4.5.3.c.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.1.5.c.c.5.a.4.-.c.6.6.1.-.4.a.e.9.-.a.a.c.1.-.d.f.b.2.a.8.c.a.e.1.0.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.b.a.d._.m.o.d.u.l.e._.i.n.f.o.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.4.4.-.0.0.0.1.-.0.0.1.5.-.4.3.8.6.-.a.8.d.5.8.7.c.c.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.b.4.0.2.f.b.2.4.b.2.0.6.c.4.a.3.7.8.a.7.4.f.d.6.4.9.c.6.0.a.4.1.3.c.e.5.a.9.2.!.c.s.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):6244
      Entropy (8bit):3.695815268918576
      Encrypted:false
      SSDEEP:96:RSIU6o7wVetbW4O6OYR+V+Cbt5aMeUKq89bAxJsfayhm:R6l7wVeJW4O6OYUppxx89bAxJsfayhm
      MD5:0738791E8695DEAC21E8A91ACE43B4B3
      SHA1:EA7C484A08280CED7983146F5D653715E2F94EC1
      SHA-256:F521E1F933948728052BCE29C37C46628812E790D6E919D2472D1DFBC5488BBF
      SHA-512:B04AD0F7AB912857A78A332508C94FFEAB670472D7168CD7034DC2402EDB73988FB6D5E29063A4A484BA53EF2C4C64F7CEFA63C762C20DEA0ED3B9CD07381B54
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.9.3.2.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4564
      Entropy (8bit):4.42183870608659
      Encrypted:false
      SSDEEP:48:cvIwWl8zs4iJg77aI9aVWpW8VY0Ym8M4JTHF2+q87YdH3oz9d:uIjf4wI7Uk7VwJYzdH3W9d
      MD5:254488C7BC11443C4D21015919A87DBA
      SHA1:DACEFDC52AC6F3CF1C565C31A1EBF2BA4BF70555
      SHA-256:86BE16DD040BF30BA916B729F4A7C62B34FE561DC21AFF4AB03B4DDC7FFADF3C
      SHA-512:E6F6E2FE146B3D3BB5F372AABC97F683DFCE8471A4B5B7CA05DB9BD05F97F872220F6F59EA5009B91996C006EC6EC61A34473C872DCACC78CE9FD216BC29FD3A
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="393420" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):4744
      Entropy (8bit):3.2428824725333505
      Encrypted:false
      SSDEEP:96:pwpIitkXkkX5kuguWL0Qg0QF0Qge0QXs0Qi0QQTHgmXQcszeuzSzbxGQI5/msspJ:pglY+uIYyoeyOkNe
      MD5:25D111C7DBD3093C2EDB2F83618E88A8
      SHA1:6324AE2F2074ADCEDD1DD09628F181BA8D289EE1
      SHA-256:76379A7C933C7C57367C63CEDE85F079C8F5E14FD79F1F804A749BE1DEBE48D7
      SHA-512:9ABC4E3F9F17246548BE53F8092154F61C8A539C1D63F7CC85F55AE957771AE73741C60FAB9BD3E90A1A10023184277C8FA5958BCB4FC2DD40422668DA318F51
      Malicious:false
      Reputation:low
      Preview:......S.n.a.p.s.h.o.t. .s.t.a.t.i.s.t.i.c.s.:.....-. .S.i.g.n.a.t.u.r.e. . . . . . . . . . . . . . . . .:. .P.S.S.D.......-. .F.l.a.g.s./.C.a.p.t.u.r.e.F.l.a.g.s. . . . . . . .:. .0.0.0.0.0.0.0.1./.d.0.0.0.3.9.f.f.......-. .A.u.x. .p.a.g.e.s. . . . . . . . . . . . . . . . .:. .1. .e.n.t.r.i.e.s. .l.o.n.g.......-. .V.A. .s.p.a.c.e. .s.t.r.e.a.m. . . . . . . . . . .:. .2.9.2.8. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .H.a.n.d.l.e. .t.r.a.c.e. .s.t.r.e.a.m. . . . . . .:. .0. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .H.a.n.d.l.e. .s.t.r.e.a.m. . . . . . . . . . . . .:. .8.4.8. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .T.h.r.e.a.d.s. . . . . . . . . . . . . . . . . . .:. .1. .t.h.r.e.a.d.s.......-. .T.h.r.e.a.d. .s.t.r.e.a.m. . . . . . . . . . . . .:. .8.3.2. .b.y.t.e.s. .i.n. .s.i.z.e...........S.n.a.p.s.h.o.t. .p.e.r.f.o.r.m.a.n.c.e. .c.o.u.n.t.e.r.s.:.....-. .T.o.t.a.l.C.y.c.l.e.C.o.u.n.t. . . . . . . . . . .:. .3.5.1.5.2.5.3. .c.y.c.l.e.s.......-. .V.a.C.l.o.n.e.C.y.c.l.e.C.o.u.n.t. . . . . . . . .:.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.469257901838899
      Encrypted:false
      SSDEEP:6144:NzZfpi6ceLPx9skLmb0f6ZWSP3aJG8nAgeiJRMMhA2zX4WABluuNrjDH5S:FZHt6ZWOKnMM6bFpdj4
      MD5:BCCAEBFC928C2A68987645C376349C6A
      SHA1:E0B872306243EDCA5FB562580F3625BCBD224104
      SHA-256:0213213DA5C46237C811B47D6C769243A4A0A5F8D26EF74A20A5EF0F0666210B
      SHA-512:955F97DFA9CA95D214AA12541343B9AFBC7DA57134E5E7D19C7DC6013BC4035D05DC90683609D19BC70D7B7F74CF06F07510B52A6F3E072E6DD07ED7EFDC9996
      Malicious:false
      Reputation:low
      Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmf?.................................................................................................................................................................................................................................................................................................................................................G...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32+ executable (GUI) x86-64, for MS Windows
      Entropy (8bit):7.055430688577327
      TrID:
      • Win64 Executable GUI Net Framework (217006/5) 49.88%
      • Win64 Executable GUI (202006/5) 46.43%
      • Win64 Executable (generic) (12005/4) 2.76%
      • Generic Win/DOS Executable (2004/3) 0.46%
      • DOS Executable Generic (2002/1) 0.46%
      File name:PO454355 Pdf.exe
      File size:2'404'352 bytes
      MD5:2d8c7cd70698ef3b6d1a3e042de0a93a
      SHA1:c73700a78a391e61b9ca3535c8d26dde12035808
      SHA256:657f1fddc9566fb412981480dcc6f6600219c6e5ca756070fe5b15baaa3843ce
      SHA512:a1ddd9992088aa6488d15235bb8985ac366dbe0614636eb4522a66ce5d173477e53421e5d01b6a57df9eebf838b1362cc5222690cb0712079c21e0d4aa9c0ba1
      SSDEEP:49152:EF50a6aPVOFMx3SmroCZscivbS6mqxEWoKmqZJffp3vSsqPUxeaw1GnNOmyVS5ks:2roA7PqryV2
      TLSH:9EB5AD15E3E801A8D87BD634CA62A333DBB078961730D58F0659D6592F73EA19B3F312
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......'..Ec...c...c....v..j....v..n....v..M...j.D.m...(...h...c...n....w..k....w..b...c...b....w..$...pq..b...pq..b...Richc..........
      Icon Hash:00928e8e8686b000
      Entrypoint:0x14006b3dc
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x667DA332 [Thu Jun 27 17:36:50 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:97f00b2383bd4369e5094078fdccae7a
      Instruction
      dec eax
      sub esp, 28h
      call 00007FA3ACD3C0E0h
      dec eax
      add esp, 28h
      jmp 00007FA3ACD3B927h
      int3
      int3
      jmp 00007FA3ACD3C45Ch
      int3
      int3
      int3
      dec eax
      sub esp, 28h
      dec ebp
      mov eax, dword ptr [ecx+38h]
      dec eax
      mov ecx, edx
      dec ecx
      mov edx, ecx
      call 00007FA3ACD3BAC2h
      mov eax, 00000001h
      dec eax
      add esp, 28h
      ret
      int3
      int3
      int3
      inc eax
      push ebx
      inc ebp
      mov ebx, dword ptr [eax]
      dec eax
      mov ebx, edx
      inc ecx
      and ebx, FFFFFFF8h
      dec esp
      mov ecx, ecx
      inc ecx
      test byte ptr [eax], 00000004h
      dec esp
      mov edx, ecx
      je 00007FA3ACD3BAC5h
      inc ecx
      mov eax, dword ptr [eax+08h]
      dec ebp
      arpl word ptr [eax+04h], dx
      neg eax
      dec esp
      add edx, ecx
      dec eax
      arpl ax, cx
      dec esp
      and edx, ecx
      dec ecx
      arpl bx, ax
      dec edx
      mov edx, dword ptr [eax+edx]
      dec eax
      mov eax, dword ptr [ebx+10h]
      mov ecx, dword ptr [eax+08h]
      dec eax
      mov eax, dword ptr [ebx+08h]
      test byte ptr [ecx+eax+03h], 0000000Fh
      je 00007FA3ACD3BABDh
      movzx eax, byte ptr [ecx+eax+03h]
      and eax, FFFFFFF0h
      dec esp
      add ecx, eax
      dec esp
      xor ecx, edx
      dec ecx
      mov ecx, ecx
      pop ebx
      jmp 00007FA3ACD3BAD2h
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      nop word ptr [eax+eax+00000000h]
      dec eax
      cmp ecx, dword ptr [001D73A9h]
      jne 00007FA3ACD3BAC2h
      dec eax
      rol ecx, 10h
      test cx, FFFFh
      jne 00007FA3ACD3BAB3h
      Programming Language:
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x23ec600x58.rdata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x23ecb80x104.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2640000x42cc8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2500000x1368c.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2a70000x5ec.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x2166000x54.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x2168000x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2164c00x140.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x1980000x818.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x6fef80x70000dd316bc2c65b1ae399457fdba120fa82False0.45282200404575895data6.641185225824904IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .managed0x710000xd9b180xd9c0074b435642e339cdb1b2a678eb60c92d8False0.4628401711394948data6.464502436229499IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      hydrated0x14b0000x4c5400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x1980000xa89e40xa8a00bd65f4b9688a88a524e0a85d128283afFalse0.48930341919940695data6.720992467115288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x2410000xe6680x1a00f7893d3998d6fe23c3c2fd83a455cf8dFalse0.22581129807692307data3.2697501080046183IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x2500000x1368c0x13800e5aeded247d82c5d18901a5f5b1c4999False0.49800931490384615data6.163194359627306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x2640000x42cc80x42e00189fa122086a1fba0d211d37182b20dcFalse0.996648656542056data7.998290963932367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x2a70000x5ec0x60022b17bd43d0ff4894ef88b7e105d8348False0.5989583333333334data5.299377162126531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      BINARY0x26411c0x42684data1.000334553903619
      RT_VERSION0x2a67a00x33cdata0.3828502415458937
      RT_MANIFEST0x2a6adc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      ADVAPI32.dllAdjustTokenPrivileges, CreateWellKnownSid, DeregisterEventSource, DuplicateTokenEx, GetSecurityDescriptorLength, GetTokenInformation, GetWindowsAccountDomainSid, LookupPrivilegeValueW, OpenProcessToken, OpenThreadToken, RegCloseKey, RegCreateKeyExW, RegDeleteKeyExW, RegDeleteTreeW, RegDeleteValueW, RegEnumKeyExW, RegEnumValueW, RegFlushKey, RegOpenKeyExW, RegQueryInfoKeyW, RegQueryValueExW, RegSetValueExA, RegSetValueExW, RegisterEventSourceW, ReportEventW, RevertToSelf, SetThreadToken
      bcrypt.dllBCryptDestroyKey, BCryptEncrypt, BCryptGenRandom, BCryptOpenAlgorithmProvider, BCryptSetProperty, BCryptDecrypt, BCryptCloseAlgorithmProvider, BCryptImportKey
      KERNEL32.dllTlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, EncodePointer, RaiseException, RtlPcToFileHeader, AllocConsole, CancelThreadpoolIo, CloseHandle, CloseThreadpoolIo, CompareStringEx, CompareStringOrdinal, CopyFileExW, CreateDirectoryW, CreateEventExW, CreateFileW, CreateProcessA, CreateSymbolicLinkW, CreateThreadpoolIo, DeleteCriticalSection, DeleteFileW, DeleteVolumeMountPointW, DeviceIoControl, DuplicateHandle, EnterCriticalSection, EnumCalendarInfoExEx, EnumTimeFormatsEx, ExitProcess, ExpandEnvironmentStringsW, FileTimeToSystemTime, FindClose, FindFirstFileExW, FindNLSStringEx, FindNextFileW, FindStringOrdinal, FlushFileBuffers, FormatMessageW, FreeConsole, FreeLibrary, GetCPInfo, GetCalendarInfoEx, GetConsoleOutputCP, GetConsoleWindow, GetCurrentProcess, GetCurrentProcessId, GetCurrentProcessorNumberEx, GetCurrentThread, GetDynamicTimeZoneInformation, GetEnvironmentVariableW, GetFileAttributesExW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFileType, GetFinalPathNameByHandleW, GetFullPathNameW, GetLastError, GetLocaleInfoEx, GetLogicalDrives, GetLongPathNameW, GetModuleFileNameW, GetModuleHandleA, GetOverlappedResult, GetProcAddress, GetStdHandle, GetSystemDirectoryW, GetSystemTime, GetThreadPriority, GetTickCount64, GetTimeZoneInformation, GetUserPreferredUILanguages, GetVolumeInformationW, InitializeConditionVariable, InitializeCriticalSection, IsDebuggerPresent, LCMapStringEx, LeaveCriticalSection, LoadLibraryExW, LocalAlloc, LocalFree, LocaleNameToLCID, MoveFileExW, MultiByteToWideChar, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseFailFastException, ReadFile, RemoveDirectoryW, ReplaceFileW, ResetEvent, ResolveLocaleName, ResumeThread, SetEvent, SetFileAttributesW, SetFileInformationByHandle, SetLastError, SetThreadErrorMode, SetThreadPriority, Sleep, SleepConditionVariableCS, StartThreadpoolIo, SystemTimeToFileTime, TzSpecificLocalTimeToSystemTime, VirtualAlloc, VirtualFree, WaitForMultipleObjectsEx, WakeConditionVariable, WideCharToMultiByte, WriteFile, FlushProcessWriteBuffers, WaitForSingleObjectEx, RtlVirtualUnwind, RtlCaptureContext, RtlRestoreContext, VerSetConditionMask, AddVectoredExceptionHandler, FlsAlloc, FlsGetValue, FlsSetValue, CreateEventW, SwitchToThread, CreateThread, GetCurrentThreadId, SuspendThread, GetThreadContext, SetThreadContext, QueryInformationJobObject, GetModuleHandleW, GetModuleHandleExW, GetProcessAffinityMask, VerifyVersionInfoW, InitializeContext, GetEnabledXStateFeatures, SetXStateFeaturesMask, VirtualQuery, GetSystemTimeAsFileTime, InitializeCriticalSectionEx, DebugBreak, WaitForSingleObject, SleepEx, GlobalMemoryStatusEx, GetSystemInfo, GetLogicalProcessorInformation, GetLogicalProcessorInformationEx, GetLargePageMinimum, VirtualUnlock, VirtualAllocExNuma, IsProcessInJob, GetNumaHighestNodeNumber, GetProcessGroupAffinity, K32GetProcessMemoryInfo, RtlUnwindEx, InitializeSListHead, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlLookupFunctionEntry
      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CoUninitialize, CoWaitForMultipleHandles, CoInitializeEx, CoCreateGuid, CoGetApartmentType
      USER32.dllLoadStringW
      api-ms-win-crt-math-l1-1-0.dll__setusermatherr, floor, pow, modf, sin, cos, ceil, tan
      api-ms-win-crt-heap-l1-1-0.dllfree, calloc, _set_new_mode, malloc, _callnewh
      api-ms-win-crt-string-l1-1-0.dllstrncpy_s, strcpy_s, _stricmp, wcsncmp, strcmp
      api-ms-win-crt-convert-l1-1-0.dllstrtoull
      api-ms-win-crt-runtime-l1-1-0.dll_register_thread_local_exe_atexit_callback, _c_exit, _cexit, __p___wargv, __p___argc, _exit, exit, _initterm_e, terminate, _crt_atexit, _initterm, _register_onexit_function, _get_initial_wide_environment, abort, _initialize_onexit_table, _initialize_wide_environment, _configure_wide_argv, _seh_filter_exe, _set_app_type
      api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsscanf, __p__commode, __acrt_iob_func, __stdio_common_vfprintf, __stdio_common_vsprintf_s, _set_fmode
      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
      NameOrdinalAddress
      DotNetRuntimeDebugHeader10x140241d50
      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      07/02/24-15:46:31.893078TCP2856318ETPRO TROJAN FormBook CnC Checkin (POST) M46273680192.168.2.43.33.244.179
      TimestampSource PortDest PortSource IPDest IP
      Jul 2, 2024 15:58:25.363615036 CEST5357720162.159.36.2192.168.2.6
      Jul 2, 2024 15:58:25.843803883 CEST6087653192.168.2.61.1.1.1
      Jul 2, 2024 15:58:25.851548910 CEST53608761.1.1.1192.168.2.6
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Jul 2, 2024 15:58:25.843803883 CEST192.168.2.61.1.1.10x258bStandard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jul 2, 2024 15:58:25.851548910 CEST1.1.1.1192.168.2.60x258bName error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:09:57:52
      Start date:02/07/2024
      Path:C:\Users\user\Desktop\PO454355 Pdf.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\PO454355 Pdf.exe"
      Imagebase:0x7ff6e8d20000
      File size:2'404'352 bytes
      MD5 hash:2D8C7CD70698EF3B6D1A3E042DE0A93A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:2
      Start time:09:57:53
      Start date:02/07/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:09:57:53
      Start date:02/07/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
      Imagebase:0x390000
      File size:2'141'552 bytes
      MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:false

      Target ID:6
      Start time:09:57:54
      Start date:02/07/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 20
      Imagebase:0x870000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:5.7%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:25.7%
        Total number of Nodes:943
        Total number of Limit Nodes:27
        execution_graph 15525 7ff6e8d3f97d 15530 7ff6e8d61b20 15525->15530 15527 7ff6e8d61b20 6 API calls 15528 7ff6e8d3f95b 15527->15528 15528->15527 15529 7ff6e8d3fa61 15528->15529 15533 7ff6e8d3c690 15530->15533 15532 7ff6e8d61b5a 15532->15528 15534 7ff6e8d3c6da 15533->15534 15539 7ff6e8d3c7b1 15534->15539 15541 7ff6e8d61970 15534->15541 15537 7ff6e8d3c9d3 15537->15539 15553 7ff6e8d44420 15537->15553 15539->15532 15540 7ff6e8d3c7eb _swprintf_c_l 15540->15537 15549 7ff6e8d54960 15540->15549 15542 7ff6e8d61989 15541->15542 15546 7ff6e8d61999 15541->15546 15542->15540 15543 7ff6e8d61adb SwitchToThread 15543->15546 15544 7ff6e8d619e9 SwitchToThread 15544->15546 15545 7ff6e8d61ae7 15545->15540 15546->15543 15546->15544 15546->15545 15547 7ff6e8d61a90 SwitchToThread 15546->15547 15548 7ff6e8d61aa6 SwitchToThread 15546->15548 15547->15546 15548->15546 15550 7ff6e8d5497e 15549->15550 15552 7ff6e8d549e9 _swprintf_c_l 15549->15552 15550->15552 15558 7ff6e8d330b0 VirtualAlloc 15550->15558 15552->15537 15554 7ff6e8d54960 2 API calls 15553->15554 15555 7ff6e8d44455 _swprintf_c_l 15554->15555 15556 7ff6e8d61970 4 API calls 15555->15556 15557 7ff6e8d445a5 15556->15557 15557->15539 15557->15557 15559 7ff6e8d330fc 15558->15559 15560 7ff6e8d330eb 15558->15560 15559->15552 15560->15559 15561 7ff6e8d330f0 VirtualUnlock 15560->15561 15561->15559 15562 7ff6e8def860 15575 7ff6e8d23630 15562->15575 15564 7ff6e8def880 15591 7ff6e8d23e40 15564->15591 15568 7ff6e8def8a6 15603 7ff6e8d247c0 15568->15603 15570 7ff6e8def8b8 15571 7ff6e8def8d9 15570->15571 15608 7ff6e8defbb0 15570->15608 15612 7ff6e8de15d0 15571->15612 15574 7ff6e8def8e6 15576 7ff6e8d2365f 15575->15576 15577 7ff6e8d2368e 15575->15577 15576->15577 15578 7ff6e8d2371f 15576->15578 15581 7ff6e8d23706 15576->15581 15586 7ff6e8d236e7 15576->15586 15587 7ff6e8d236c8 15576->15587 15577->15564 15579 7ff6e8d23726 15578->15579 15580 7ff6e8d2373f 15578->15580 15626 7ff6e8d2d250 15579->15626 15584 7ff6e8d23765 15580->15584 15629 7ff6e8d234c0 GetLastError 15580->15629 15620 7ff6e8d279b0 15581->15620 15584->15564 15585 7ff6e8d23732 RaiseFailFastException 15585->15580 15586->15581 15590 7ff6e8d236f9 RaiseFailFastException 15586->15590 15589 7ff6e8d236d0 Sleep 15587->15589 15589->15586 15589->15589 15590->15581 15635 7ff6e8d8b4b0 15591->15635 15594 7ff6e8defa00 15595 7ff6e8defa3c 15594->15595 15596 7ff6e8defb26 15595->15596 15599 7ff6e8defb17 15595->15599 15660 7ff6e8d23dd0 15595->15660 15602 7ff6e8defb33 15596->15602 15665 7ff6e8df0b20 15596->15665 15600 7ff6e8d247c0 26 API calls 15599->15600 15600->15596 15602->15568 15604 7ff6e8d247c9 15603->15604 15605 7ff6e8d2480e 15604->15605 15606 7ff6e8d24c10 26 API calls 15604->15606 15605->15570 15607 7ff6e8de2310 15606->15607 15609 7ff6e8defbd8 15608->15609 15611 7ff6e8defc08 15609->15611 15829 7ff6e8defdc0 15609->15829 15611->15570 15614 7ff6e8de15da 15612->15614 15613 7ff6e8de15df 15613->15574 15614->15613 15615 7ff6e8d24c10 26 API calls 15614->15615 15617 7ff6e8de1604 15615->15617 15616 7ff6e8de161f 15616->15574 15617->15616 15618 7ff6e8d24c10 26 API calls 15617->15618 15619 7ff6e8de1644 15618->15619 15621 7ff6e8d279d6 15620->15621 15625 7ff6e8d279f4 15621->15625 15632 7ff6e8d2ccd0 FlsGetValue 15621->15632 15623 7ff6e8d279ec 15624 7ff6e8d22ab0 6 API calls 15623->15624 15624->15625 15625->15578 15627 7ff6e8d2d264 15626->15627 15627->15627 15628 7ff6e8d2d26d GetStdHandle WriteFile 15627->15628 15628->15585 15630 7ff6e8d234e4 SetLastError 15629->15630 15633 7ff6e8d2ccf8 FlsSetValue 15632->15633 15634 7ff6e8d2ccea RaiseFailFastException 15632->15634 15634->15633 15638 7ff6e8d8bda4 15635->15638 15637 7ff6e8d23e5a 15637->15594 15639 7ff6e8d8bdbe malloc 15638->15639 15640 7ff6e8d8bdc8 15639->15640 15641 7ff6e8d8bdaf 15639->15641 15640->15637 15641->15639 15642 7ff6e8d8bdce 15641->15642 15643 7ff6e8d8bdd9 15642->15643 15647 7ff6e8d8c204 15642->15647 15651 7ff6e8d8c224 15643->15651 15648 7ff6e8d8c212 std::bad_alloc::bad_alloc 15647->15648 15655 7ff6e8d8cf30 15648->15655 15650 7ff6e8d8c223 15652 7ff6e8d8c232 std::bad_alloc::bad_alloc 15651->15652 15653 7ff6e8d8cf30 Concurrency::cancel_current_task 2 API calls 15652->15653 15654 7ff6e8d8bddf 15653->15654 15654->15637 15656 7ff6e8d8cf4f 15655->15656 15657 7ff6e8d8cf78 RtlPcToFileHeader 15656->15657 15658 7ff6e8d8cf9a RaiseException 15656->15658 15659 7ff6e8d8cf90 15657->15659 15658->15650 15659->15658 15669 7ff6e8d2f0e0 15660->15669 15663 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 15664 7ff6e8d23dfa 15663->15664 15664->15595 15666 7ff6e8df0b31 15665->15666 15673 7ff6e8d24c10 15666->15673 15670 7ff6e8d2f10c 15669->15670 15672 7ff6e8d23ddf 15669->15672 15671 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 15670->15671 15670->15672 15671->15672 15672->15663 15674 7ff6e8d24ccb 15673->15674 15679 7ff6e8de23e0 15674->15679 15680 7ff6e8de23f2 15679->15680 15683 7ff6e8de24a0 15680->15683 15696 7ff6e8d276e0 15683->15696 15685 7ff6e8de260c 15728 7ff6e8d24350 15685->15728 15687 7ff6e8de25d7 15687->15685 15724 7ff6e8de2060 15687->15724 15688 7ff6e8de251f 15688->15687 15716 7ff6e8d27820 15688->15716 15697 7ff6e8d2772b 15696->15697 15698 7ff6e8d27770 15697->15698 15699 7ff6e8d27730 15697->15699 15701 7ff6e8d2778a 15698->15701 15702 7ff6e8d2ec00 4 API calls 15698->15702 15700 7ff6e8d2774a 15699->15700 15731 7ff6e8d2ec00 15699->15731 15737 7ff6e8d26b30 15700->15737 15704 7ff6e8d277a6 15701->15704 15705 7ff6e8d277bb 15701->15705 15702->15701 15707 7ff6e8d272e0 2 API calls 15704->15707 15708 7ff6e8d272e0 2 API calls 15705->15708 15710 7ff6e8d277b2 15707->15710 15708->15710 15712 7ff6e8d2776e 15710->15712 15713 7ff6e8d2ec00 4 API calls 15710->15713 15714 7ff6e8d277f2 15712->15714 15750 7ff6e8d264c0 15712->15750 15713->15712 15714->15688 15717 7ff6e8d27862 15716->15717 15779 7ff6e8d26ed0 15717->15779 15719 7ff6e8d27871 15720 7ff6e8d27892 15719->15720 15721 7ff6e8d2ec00 4 API calls 15719->15721 15722 7ff6e8d264c0 2 API calls 15720->15722 15723 7ff6e8d278a3 15720->15723 15721->15720 15722->15723 15723->15688 15726 7ff6e8de2094 15724->15726 15808 7ff6e8d240c0 15726->15808 15727 7ff6e8de20d1 15727->15685 15729 7ff6e8d24378 RaiseFailFastException 15728->15729 15730 7ff6e8d24385 15728->15730 15729->15730 15732 7ff6e8d2ecac 15731->15732 15734 7ff6e8d2ec3b 15731->15734 15732->15700 15734->15732 15736 7ff6e8d2ec74 15734->15736 15756 7ff6e8d2e920 15734->15756 15736->15732 15764 7ff6e8d2ecc0 15736->15764 15739 7ff6e8d26b4d _swprintf_c_l 15737->15739 15738 7ff6e8d26d11 15745 7ff6e8d272e0 15738->15745 15739->15738 15740 7ff6e8d26cf0 15739->15740 15741 7ff6e8d26cd9 RaiseFailFastException 15739->15741 15742 7ff6e8d26ce8 15739->15742 15740->15738 15743 7ff6e8d2ec00 4 API calls 15740->15743 15741->15740 15773 7ff6e8d27520 15742->15773 15743->15738 15746 7ff6e8d27340 15745->15746 15747 7ff6e8d272f2 15745->15747 15746->15712 15747->15746 15748 7ff6e8d264c0 2 API calls 15747->15748 15749 7ff6e8d2731b 15748->15749 15749->15712 15751 7ff6e8d264e0 15750->15751 15752 7ff6e8d264d8 15750->15752 15751->15714 15752->15751 15753 7ff6e8d26556 15752->15753 15754 7ff6e8d26549 RaiseFailFastException 15752->15754 15753->15751 15755 7ff6e8d26571 RaiseFailFastException 15753->15755 15754->15753 15755->15751 15757 7ff6e8d2e944 15756->15757 15758 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 15757->15758 15762 7ff6e8d2e9df 15757->15762 15759 7ff6e8d2e9b4 15758->15759 15760 7ff6e8d2ea6c 15759->15760 15761 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 15759->15761 15760->15736 15761->15762 15762->15760 15768 7ff6e8d2ce60 GetCurrentThreadId 15762->15768 15765 7ff6e8d2ecfa 15764->15765 15766 7ff6e8d2ed24 15765->15766 15769 7ff6e8d2e750 15765->15769 15766->15732 15768->15760 15771 7ff6e8d2e77a _swprintf_c_l 15769->15771 15770 7ff6e8d2e7a1 15770->15766 15771->15770 15772 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 15771->15772 15772->15770 15777 7ff6e8d27533 15773->15777 15774 7ff6e8d27673 RaiseFailFastException 15774->15777 15775 7ff6e8d275f2 RaiseFailFastException 15775->15777 15776 7ff6e8d27608 RaiseFailFastException 15776->15777 15777->15774 15777->15775 15777->15776 15778 7ff6e8d276a1 15777->15778 15778->15740 15780 7ff6e8d26f0a 15779->15780 15781 7ff6e8d26f80 RaiseFailFastException 15780->15781 15782 7ff6e8d271f8 15780->15782 15785 7ff6e8d271fe 15780->15785 15786 7ff6e8d2724c 15780->15786 15787 7ff6e8d2723d RaiseFailFastException 15780->15787 15789 7ff6e8d270d4 RaiseFailFastException 15780->15789 15793 7ff6e8d264c0 2 API calls 15780->15793 15794 7ff6e8d271ab RaiseFailFastException 15780->15794 15795 7ff6e8d271c1 RaiseFailFastException 15780->15795 15796 7ff6e8d2ec00 4 API calls 15780->15796 15797 7ff6e8d26750 15780->15797 15781->15780 15783 7ff6e8d26b30 8 API calls 15782->15783 15782->15785 15783->15785 15784 7ff6e8d272ca 15784->15719 15785->15784 15790 7ff6e8d264c0 2 API calls 15785->15790 15788 7ff6e8d27520 3 API calls 15786->15788 15787->15785 15788->15785 15789->15780 15792 7ff6e8d272a3 15790->15792 15792->15719 15793->15780 15794->15780 15795->15780 15796->15780 15798 7ff6e8d267a7 15797->15798 15799 7ff6e8d2677d 15797->15799 15801 7ff6e8d26916 15798->15801 15805 7ff6e8d267d4 15798->15805 15800 7ff6e8d2ec00 4 API calls 15799->15800 15800->15798 15802 7ff6e8d26929 15801->15802 15803 7ff6e8d2691c RaiseFailFastException 15801->15803 15804 7ff6e8d264c0 2 API calls 15802->15804 15803->15802 15807 7ff6e8d26901 15804->15807 15806 7ff6e8d264c0 2 API calls 15805->15806 15806->15807 15807->15780 15809 7ff6e8d240da _swprintf_c_l 15808->15809 15812 7ff6e8d2d3f0 RtlCaptureContext 15809->15812 15815 7ff6e8d8b490 15812->15815 15816 7ff6e8d8b499 15815->15816 15817 7ff6e8d240e9 15816->15817 15818 7ff6e8d8b740 IsProcessorFeaturePresent 15816->15818 15817->15727 15819 7ff6e8d8b758 15818->15819 15824 7ff6e8d8b938 RtlCaptureContext 15819->15824 15825 7ff6e8d8b952 RtlLookupFunctionEntry 15824->15825 15826 7ff6e8d8b76b 15825->15826 15827 7ff6e8d8b968 RtlVirtualUnwind 15825->15827 15828 7ff6e8d8b70c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15826->15828 15827->15825 15827->15826 15830 7ff6e8d247c0 26 API calls 15829->15830 15833 7ff6e8defe06 15830->15833 15831 7ff6e8deff0f 15831->15611 15833->15831 15834 7ff6e8d22350 15833->15834 15835 7ff6e8d22396 15834->15835 15838 7ff6e8d220b0 15835->15838 15837 7ff6e8d223a6 15837->15833 15839 7ff6e8d220e0 15838->15839 15840 7ff6e8d22178 15839->15840 15843 7ff6e8d38d69 15839->15843 15847 7ff6e8d38dcb 15839->15847 15840->15837 15844 7ff6e8d38d6d 15843->15844 15846 7ff6e8d38d2a 15843->15846 15844->15846 15863 7ff6e8d3b8a0 15844->15863 15846->15840 15848 7ff6e8d38dec 15847->15848 15849 7ff6e8d38e55 15848->15849 15850 7ff6e8d38e2e GetTickCount64 15848->15850 15857 7ff6e8d38ed7 15848->15857 15873 7ff6e8d634a0 15849->15873 15850->15849 15853 7ff6e8d38e42 15850->15853 15853->15857 15855 7ff6e8d38da0 15883 7ff6e8d63570 15855->15883 15856 7ff6e8d38d2a 15856->15840 15857->15855 15887 7ff6e8d3f1b0 15857->15887 15858 7ff6e8d38f39 15858->15856 15862 7ff6e8d3b8a0 3 API calls 15858->15862 15860 7ff6e8d38e79 15860->15855 15860->15857 15861 7ff6e8d38eb3 GetTickCount64 15860->15861 15861->15853 15861->15857 15862->15856 15865 7ff6e8d3b8d2 15863->15865 15867 7ff6e8d3b943 15863->15867 15864 7ff6e8d3b916 SwitchToThread 15864->15865 15865->15864 15865->15867 15870 7ff6e8d32dc0 15865->15870 15868 7ff6e8d3ba20 DebugBreak 15867->15868 15869 7ff6e8d3ba25 15867->15869 15868->15869 15869->15846 15871 7ff6e8d32dcd 15870->15871 15872 7ff6e8d32dc4 SleepEx 15870->15872 15871->15865 15872->15871 15874 7ff6e8d6355a 15873->15874 15875 7ff6e8d634c0 15873->15875 15874->15860 15893 7ff6e8d32570 15875->15893 15877 7ff6e8d6354a 15877->15860 15885 7ff6e8d63586 15883->15885 15884 7ff6e8d635bd 15884->15855 15885->15884 15911 7ff6e8d33120 WaitForSingleObject 15885->15911 15888 7ff6e8d38f13 15887->15888 15889 7ff6e8d3f1e7 15887->15889 15888->15855 15888->15856 15888->15858 15889->15888 15890 7ff6e8d32dc0 SleepEx 15889->15890 15891 7ff6e8d3f225 15890->15891 15891->15888 15892 7ff6e8d4c550 3 API calls 15891->15892 15892->15888 15894 7ff6e8d325a7 GetCurrentProcess 15893->15894 15895 7ff6e8d3265f GlobalMemoryStatusEx 15893->15895 15896 7ff6e8d325c0 15894->15896 15898 7ff6e8d325c8 15895->15898 15896->15895 15896->15898 15897 7ff6e8d8b490 8 API calls 15899 7ff6e8d32738 15897->15899 15898->15897 15899->15877 15900 7ff6e8d38800 15899->15900 15901 7ff6e8d38818 15900->15901 15910 7ff6e8d33120 WaitForSingleObject 15901->15910 15912 7ff6e8d3eb61 15914 7ff6e8d3eb80 15912->15914 15915 7ff6e8d3ebe2 15914->15915 15938 7ff6e8d57bb0 15914->15938 15924 7ff6e8d3eb22 15915->15924 15927 7ff6e8d3f800 15915->15927 15917 7ff6e8d3ed04 15919 7ff6e8d3f1b0 3 API calls 15917->15919 15918 7ff6e8d3ec2f 15919->15924 15920 7ff6e8d3ec69 15921 7ff6e8d634a0 14 API calls 15920->15921 15926 7ff6e8d3ecb8 15920->15926 15922 7ff6e8d3ec9b 15921->15922 15922->15924 15925 7ff6e8d57bb0 GetTickCount64 15922->15925 15922->15926 15923 7ff6e8d63570 WaitForSingleObject 15923->15924 15924->15918 15924->15923 15925->15926 15926->15915 15926->15917 15926->15924 15928 7ff6e8d3f842 15927->15928 15929 7ff6e8d3f927 15928->15929 15930 7ff6e8d3f8d6 15928->15930 15931 7ff6e8d3f915 15928->15931 15929->15931 15933 7ff6e8d38800 WaitForSingleObject 15929->15933 15934 7ff6e8d3f8e5 SwitchToThread 15930->15934 15932 7ff6e8d61b20 6 API calls 15931->15932 15937 7ff6e8d3f91d 15931->15937 15932->15931 15935 7ff6e8d3f8f3 15933->15935 15934->15935 15935->15931 15936 7ff6e8d4c550 3 API calls 15935->15936 15936->15931 15937->15924 15939 7ff6e8d57bf2 15938->15939 15940 7ff6e8d57bce 15938->15940 15939->15940 15941 7ff6e8d57c16 GetTickCount64 15939->15941 15940->15920 15941->15940 15942 7ff6e8d57c31 15941->15942 15942->15940 15943 7ff6e8d3b740 15944 7ff6e8d3b74b 15943->15944 15945 7ff6e8d3b750 15944->15945 15952 7ff6e8d2df20 15944->15952 15947 7ff6e8d3b789 15948 7ff6e8d32750 14 API calls 15947->15948 15949 7ff6e8d3b7db 15948->15949 15950 7ff6e8d34a40 18 API calls 15949->15950 15951 7ff6e8d3b7e7 15950->15951 15953 7ff6e8d2df2d 15952->15953 15956 7ff6e8d27f30 15953->15956 15957 7ff6e8d27f72 15956->15957 15958 7ff6e8d27f96 FlushProcessWriteBuffers 15957->15958 15960 7ff6e8d27fb3 15958->15960 15959 7ff6e8d28099 15960->15959 15961 7ff6e8d28029 SwitchToThread 15960->15961 15963 7ff6e8d23000 15960->15963 15961->15960 15964 7ff6e8d23027 15963->15964 15965 7ff6e8d23007 15963->15965 15964->15960 15965->15964 15966 7ff6e8d2cef1 LoadLibraryExW GetProcAddress 15965->15966 15978 7ff6e8d2cff4 15965->15978 15967 7ff6e8d2cfdd GetProcAddress 15966->15967 15968 7ff6e8d2cf25 GetCurrentProcess 15966->15968 15967->15978 15976 7ff6e8d2cf3a _swprintf_c_l 15968->15976 15969 7ff6e8d2d055 SuspendThread 15970 7ff6e8d2d0b9 15969->15970 15971 7ff6e8d2d063 GetThreadContext 15969->15971 15972 7ff6e8d8b490 8 API calls 15970->15972 15973 7ff6e8d2d0b0 ResumeThread 15971->15973 15974 7ff6e8d2d083 15971->15974 15975 7ff6e8d2d0c9 15972->15975 15973->15970 15974->15973 15975->15960 15976->15967 15977 7ff6e8d2cf71 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 15976->15977 15977->15967 15980 7ff6e8d2d049 15977->15980 15978->15969 15978->15970 15979 7ff6e8d2d03e GetLastError 15978->15979 15979->15980 15980->15969 15980->15970 15981 7ff6e8d244a0 15982 7ff6e8d279b0 9 API calls 15981->15982 15983 7ff6e8d244b2 15982->15983 15986 7ff6e8de1de0 15983->15986 15987 7ff6e8d23630 16 API calls 15986->15987 15988 7ff6e8de1e01 15987->15988 15993 7ff6e8dcce60 15988->15993 15990 7ff6e8de1e06 15996 7ff6e8d24600 15990->15996 16001 7ff6e8d245d0 15990->16001 16005 7ff6e8dccfb0 15993->16005 15995 7ff6e8dcce70 15995->15990 15998 7ff6e8d24610 15996->15998 15997 7ff6e8d2461c WaitForSingleObjectEx 15997->15998 16000 7ff6e8d24654 15997->16000 15998->15997 15999 7ff6e8d24645 15998->15999 15999->15990 16000->15990 16002 7ff6e8d245e6 16001->16002 16003 7ff6e8d30fba 16002->16003 16004 7ff6e8d30fc1 SetEvent 16002->16004 16003->15990 16004->15990 16006 7ff6e8dccfdc 16005->16006 16007 7ff6e8dcd04e 16006->16007 16008 7ff6e8dcd022 CoInitializeEx 16006->16008 16007->15995 16009 7ff6e8dcd039 16008->16009 16010 7ff6e8dcd03d 16009->16010 16013 7ff6e8dcd050 16009->16013 16010->16007 16017 7ff6e8dcd0d0 16010->16017 16012 7ff6e8dcd0ae 16015 7ff6e8d24c10 26 API calls 16012->16015 16013->16007 16013->16012 16014 7ff6e8d24c10 26 API calls 16013->16014 16014->16012 16016 7ff6e8dcd0ce 16015->16016 16018 7ff6e8dcd0f6 16017->16018 16019 7ff6e8dcd129 CoUninitialize 16018->16019 16020 7ff6e8dcd137 16018->16020 16019->16020 16020->16007 16021 7ff6e8d26342 16022 7ff6e8d26350 16021->16022 16025 7ff6e8de1660 16022->16025 16023 7ff6e8d313e7 16023->16023 16026 7ff6e8de1679 16025->16026 16029 7ff6e8de1760 16026->16029 16028 7ff6e8de1689 16028->16023 16030 7ff6e8de1799 16029->16030 16032 7ff6e8de1776 16029->16032 16034 7ff6e8de1800 16030->16034 16032->16028 16033 7ff6e8de17ad 16033->16028 16037 7ff6e8de1822 16034->16037 16035 7ff6e8de1966 16038 7ff6e8d24c10 26 API calls 16035->16038 16036 7ff6e8de1882 16036->16033 16037->16035 16037->16036 16039 7ff6e8d24c10 26 API calls 16037->16039 16040 7ff6e8de1979 16038->16040 16039->16035 16041 7ff6e8d52aa0 16042 7ff6e8d52abd 16041->16042 16063 7ff6e8d32dd0 VirtualAlloc 16042->16063 16044 7ff6e8d52ae3 16066 7ff6e8d32b70 InitializeCriticalSection 16044->16066 16046 7ff6e8d52b2d 16047 7ff6e8d52f53 16046->16047 16067 7ff6e8d631f0 16046->16067 16049 7ff6e8d52b5c _swprintf_c_l 16062 7ff6e8d52d9a 16049->16062 16077 7ff6e8d527b0 16049->16077 16051 7ff6e8d52d2f 16081 7ff6e8d32ee0 16051->16081 16053 7ff6e8d52d69 16053->16062 16084 7ff6e8d52f80 16053->16084 16055 7ff6e8d52d8b 16056 7ff6e8d52d8f 16055->16056 16058 7ff6e8d52dbe 16055->16058 16139 7ff6e8d32ec0 VirtualFree 16056->16139 16058->16062 16101 7ff6e8d65e20 16058->16101 16064 7ff6e8d32e09 16063->16064 16065 7ff6e8d32df1 VirtualFree 16063->16065 16064->16044 16065->16044 16066->16046 16068 7ff6e8d6321f 16067->16068 16069 7ff6e8d6324c 16068->16069 16070 7ff6e8d63242 16068->16070 16074 7ff6e8d63277 16068->16074 16072 7ff6e8d32ee0 3 API calls 16069->16072 16140 7ff6e8d32f60 16070->16140 16075 7ff6e8d6325d 16072->16075 16074->16049 16075->16074 16151 7ff6e8d32ec0 VirtualFree 16075->16151 16079 7ff6e8d527cf 16077->16079 16080 7ff6e8d527eb 16079->16080 16152 7ff6e8d32450 16079->16152 16080->16051 16082 7ff6e8d32f24 GetCurrentProcess VirtualAllocExNuma 16081->16082 16083 7ff6e8d32f05 VirtualAlloc 16081->16083 16082->16053 16083->16082 16085 7ff6e8d52fb5 16084->16085 16086 7ff6e8d52fb9 16085->16086 16094 7ff6e8d52fd3 16085->16094 16087 7ff6e8d8b490 8 API calls 16086->16087 16088 7ff6e8d52fcb 16087->16088 16088->16055 16089 7ff6e8d5301e EnterCriticalSection 16089->16094 16090 7ff6e8d5305e LeaveCriticalSection 16160 7ff6e8d32e10 16090->16160 16091 7ff6e8d53169 LeaveCriticalSection 16096 7ff6e8d530af 16091->16096 16099 7ff6e8d5317e 16091->16099 16093 7ff6e8d8b490 8 API calls 16095 7ff6e8d53140 16093->16095 16094->16089 16094->16090 16094->16091 16094->16096 16097 7ff6e8d53148 EnterCriticalSection 16094->16097 16095->16055 16096->16093 16097->16091 16099->16096 16100 7ff6e8d531a3 EnterCriticalSection LeaveCriticalSection 16099->16100 16159 7ff6e8d32ea0 VirtualFree 16099->16159 16100->16099 16163 7ff6e8d65d60 16101->16163 16104 7ff6e8d521b0 16108 7ff6e8d52218 16104->16108 16105 7ff6e8d52241 16106 7ff6e8d52774 16105->16106 16107 7ff6e8d52780 16105->16107 16138 7ff6e8d526ff 16105->16138 16181 7ff6e8d322f0 CloseHandle 16106->16181 16110 7ff6e8d52789 16107->16110 16111 7ff6e8d52795 16107->16111 16108->16105 16167 7ff6e8d32390 16108->16167 16182 7ff6e8d322f0 CloseHandle 16110->16182 16111->16062 16114 7ff6e8d52282 16114->16105 16115 7ff6e8d32390 4 API calls 16114->16115 16116 7ff6e8d52298 _swprintf_c_l 16115->16116 16116->16105 16117 7ff6e8d32570 10 API calls 16116->16117 16118 7ff6e8d525a6 16117->16118 16119 7ff6e8d32390 4 API calls 16118->16119 16120 7ff6e8d5261e 16119->16120 16121 7ff6e8d52660 16120->16121 16122 7ff6e8d32390 4 API calls 16120->16122 16121->16105 16123 7ff6e8d5272c 16121->16123 16124 7ff6e8d52720 16121->16124 16125 7ff6e8d52634 16122->16125 16127 7ff6e8d52735 16123->16127 16128 7ff6e8d52741 16123->16128 16177 7ff6e8d322f0 CloseHandle 16124->16177 16125->16121 16172 7ff6e8d32310 16125->16172 16178 7ff6e8d322f0 CloseHandle 16127->16178 16130 7ff6e8d5274a 16128->16130 16131 7ff6e8d52756 16128->16131 16179 7ff6e8d322f0 CloseHandle 16130->16179 16131->16105 16133 7ff6e8d5275f 16131->16133 16180 7ff6e8d322f0 CloseHandle 16133->16180 16136 7ff6e8d5264a 16136->16121 16137 7ff6e8d32390 4 API calls 16136->16137 16137->16121 16138->16062 16139->16062 16141 7ff6e8d33026 GetLargePageMinimum 16140->16141 16142 7ff6e8d32f8e LookupPrivilegeValueW 16140->16142 16145 7ff6e8d33046 VirtualAlloc 16141->16145 16146 7ff6e8d33063 GetCurrentProcess VirtualAllocExNuma 16141->16146 16143 7ff6e8d32faa GetCurrentProcess OpenProcessToken 16142->16143 16144 7ff6e8d3305f 16142->16144 16143->16144 16147 7ff6e8d32fe1 AdjustTokenPrivileges GetLastError CloseHandle 16143->16147 16149 7ff6e8d8b490 8 API calls 16144->16149 16145->16144 16146->16144 16147->16144 16148 7ff6e8d3301b 16147->16148 16148->16141 16148->16144 16150 7ff6e8d33096 16149->16150 16150->16075 16151->16074 16153 7ff6e8d32458 16152->16153 16154 7ff6e8d32471 GetLogicalProcessorInformation 16153->16154 16158 7ff6e8d3249d 16153->16158 16155 7ff6e8d324a4 16154->16155 16156 7ff6e8d32492 GetLastError 16154->16156 16157 7ff6e8d324e1 GetLogicalProcessorInformation 16155->16157 16155->16158 16156->16155 16156->16158 16157->16158 16158->16080 16159->16099 16161 7ff6e8d32e2b VirtualAlloc 16160->16161 16162 7ff6e8d32e4e GetCurrentProcess VirtualAllocExNuma 16160->16162 16161->16094 16162->16094 16164 7ff6e8d65d79 16163->16164 16166 7ff6e8d52f32 16163->16166 16165 7ff6e8d65d90 GetEnabledXStateFeatures 16164->16165 16164->16166 16165->16166 16166->16104 16168 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 16167->16168 16169 7ff6e8d323b6 16168->16169 16170 7ff6e8d323be CreateEventW 16169->16170 16171 7ff6e8d323e0 16169->16171 16170->16171 16171->16114 16173 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 16172->16173 16174 7ff6e8d32336 16173->16174 16175 7ff6e8d3233e CreateEventW 16174->16175 16176 7ff6e8d3235e 16174->16176 16175->16176 16176->16136 16177->16123 16178->16128 16179->16131 16180->16105 16181->16107 16182->16111 16183 7ff6e8d3ee2a 16184 7ff6e8d3ee39 16183->16184 16186 7ff6e8d3ee97 16184->16186 16187 7ff6e8d57c50 16184->16187 16188 7ff6e8d57d90 16187->16188 16195 7ff6e8d57c90 16187->16195 16189 7ff6e8d8b490 8 API calls 16188->16189 16190 7ff6e8d57dfd 16189->16190 16190->16186 16191 7ff6e8d57cfe EnterCriticalSection 16191->16195 16192 7ff6e8d57d3f LeaveCriticalSection 16194 7ff6e8d32e10 3 API calls 16192->16194 16193 7ff6e8d57e3b LeaveCriticalSection 16193->16188 16193->16195 16194->16195 16195->16188 16195->16191 16195->16192 16195->16193 16196 7ff6e8d57e1a EnterCriticalSection 16195->16196 16198 7ff6e8d57e7e EnterCriticalSection LeaveCriticalSection 16195->16198 16199 7ff6e8d32ea0 VirtualFree 16195->16199 16196->16193 16198->16195 16199->16195 16200 7ff6e8d21f2f 16201 7ff6e8dedfd0 16200->16201 16202 7ff6e8dee1a1 16201->16202 16203 7ff6e8dee1bc 16201->16203 16208 7ff6e8dedfe3 16201->16208 16204 7ff6e8dee1ba 16202->16204 16219 7ff6e8e67170 16202->16219 16205 7ff6e8d247c0 26 API calls 16203->16205 16230 7ff6e8de3cf0 16204->16230 16205->16204 16209 7ff6e8dee1ec 16210 7ff6e8dee21f 16209->16210 16211 7ff6e8dee1f7 16209->16211 16212 7ff6e8d247c0 26 API calls 16210->16212 16213 7ff6e8e67170 26 API calls 16211->16213 16215 7ff6e8dee21d 16211->16215 16212->16215 16213->16215 16236 7ff6e8dee270 16215->16236 16216 7ff6e8dee246 16240 7ff6e8de3d20 16216->16240 16218 7ff6e8dee257 16220 7ff6e8e6718b 16219->16220 16221 7ff6e8e6720a 16219->16221 16222 7ff6e8e671ea 16220->16222 16223 7ff6e8e67193 16220->16223 16245 7ff6e8dada90 16221->16245 16225 7ff6e8d247c0 26 API calls 16222->16225 16228 7ff6e8d247c0 26 API calls 16223->16228 16229 7ff6e8e671a3 16223->16229 16227 7ff6e8e671f5 16225->16227 16226 7ff6e8e67219 16226->16204 16227->16204 16228->16229 16229->16204 16231 7ff6e8de3cfc 16230->16231 16232 7ff6e8de3d18 16230->16232 16231->16209 16233 7ff6e8de3d40 16232->16233 16251 7ff6e8de3e30 16232->16251 16233->16209 16237 7ff6e8dee294 16236->16237 16239 7ff6e8dee2ce 16237->16239 16271 7ff6e8e15550 16237->16271 16239->16216 16241 7ff6e8de3d2c 16240->16241 16242 7ff6e8de3d40 16241->16242 16243 7ff6e8de3e30 26 API calls 16241->16243 16242->16218 16244 7ff6e8de3e0f 16243->16244 16244->16218 16246 7ff6e8dada99 16245->16246 16247 7ff6e8d24c10 26 API calls 16246->16247 16248 7ff6e8dadaa1 16247->16248 16249 7ff6e8d24c10 26 API calls 16248->16249 16250 7ff6e8dadac1 16249->16250 16256 7ff6e8de4470 16251->16256 16253 7ff6e8de3e47 16254 7ff6e8d24c10 26 API calls 16253->16254 16255 7ff6e8de3e6f 16254->16255 16257 7ff6e8de4489 16256->16257 16258 7ff6e8de4531 16257->16258 16260 7ff6e8de5660 16257->16260 16258->16253 16264 7ff6e8de567c 16260->16264 16261 7ff6e8de583d 16262 7ff6e8de5540 26 API calls 16261->16262 16263 7ff6e8de5784 16262->16263 16263->16258 16264->16261 16264->16263 16266 7ff6e8de5540 16264->16266 16267 7ff6e8d247c0 26 API calls 16266->16267 16268 7ff6e8de5582 16267->16268 16269 7ff6e8de55be 16268->16269 16270 7ff6e8d247c0 26 API calls 16268->16270 16269->16264 16270->16269 16272 7ff6e8e15577 16271->16272 16277 7ff6e8e38560 16272->16277 16274 7ff6e8e1558e 16285 7ff6e8e38ea0 16274->16285 16276 7ff6e8e1559a 16276->16239 16296 7ff6e8e38660 16277->16296 16279 7ff6e8e3856f 16279->16274 16280 7ff6e8e3856a 16280->16279 16281 7ff6e8d24c10 26 API calls 16280->16281 16282 7ff6e8e38598 16281->16282 16283 7ff6e8e38660 26 API calls 16282->16283 16284 7ff6e8e385b2 16283->16284 16284->16274 16287 7ff6e8e38eaa 16285->16287 16286 7ff6e8e38eaf 16286->16276 16287->16286 16288 7ff6e8d24c10 26 API calls 16287->16288 16289 7ff6e8e38ed8 16288->16289 16290 7ff6e8e38efe 16289->16290 16293 7ff6e8e38f17 16289->16293 16304 7ff6e8e39050 16290->16304 16292 7ff6e8e38f0e 16292->16276 16294 7ff6e8d24c10 26 API calls 16293->16294 16295 7ff6e8e38f5a 16294->16295 16295->16276 16297 7ff6e8e38683 16296->16297 16298 7ff6e8e386aa 16296->16298 16297->16280 16299 7ff6e8e38741 16298->16299 16301 7ff6e8e38760 16298->16301 16299->16280 16302 7ff6e8d247c0 26 API calls 16301->16302 16303 7ff6e8e3879e 16302->16303 16303->16299 16305 7ff6e8e3906c 16304->16305 16306 7ff6e8e390c8 16305->16306 16308 7ff6e8e390e0 16305->16308 16306->16292 16309 7ff6e8d247c0 26 API calls 16308->16309 16310 7ff6e8e39115 16309->16310 16310->16306 16311 7ff6e8d31150 16312 7ff6e8d3116e 16311->16312 16318 7ff6e8d31211 16312->16318 16319 7ff6e8d2d3c0 VirtualAlloc 16312->16319 16320 7ff6e8d3cb8f 16321 7ff6e8d3cb94 16320->16321 16322 7ff6e8d61970 4 API calls 16321->16322 16323 7ff6e8d3cc9d 16322->16323 16324 7ff6e8d54960 2 API calls 16323->16324 16326 7ff6e8d3ccc8 16323->16326 16324->16326 16325 7ff6e8d44420 6 API calls 16327 7ff6e8d3cd32 16325->16327 16326->16325 16328 7ff6e8d28130 16358 7ff6e8d2d0f0 FlsAlloc 16328->16358 16330 7ff6e8d282c6 16331 7ff6e8d2813f 16331->16330 16371 7ff6e8d2ce80 GetModuleHandleExW 16331->16371 16333 7ff6e8d28168 16372 7ff6e8d25710 16333->16372 16335 7ff6e8d28170 16335->16330 16380 7ff6e8d2e010 16335->16380 16339 7ff6e8d281a6 16339->16330 16340 7ff6e8d281c9 RtlAddVectoredExceptionHandler 16339->16340 16341 7ff6e8d281dc 16340->16341 16342 7ff6e8d281e2 16340->16342 16344 7ff6e8d28217 16341->16344 16345 7ff6e8d2e360 8 API calls 16341->16345 16406 7ff6e8d2e360 16342->16406 16346 7ff6e8d2826e 16344->16346 16389 7ff6e8d2eb00 16344->16389 16345->16344 16397 7ff6e8d221f0 16346->16397 16349 7ff6e8d28273 16349->16330 16409 7ff6e8d32080 16349->16409 16352 7ff6e8d282b8 16415 7ff6e8d31430 16352->16415 16353 7ff6e8d2829f 16354 7ff6e8d2d250 2 API calls 16353->16354 16356 7ff6e8d282ab RaiseFailFastException 16354->16356 16356->16352 16359 7ff6e8d2d110 16358->16359 16360 7ff6e8d2d23e 16358->16360 16419 7ff6e8d33ef0 16359->16419 16360->16331 16365 7ff6e8d2e360 8 API calls 16366 7ff6e8d2d142 16365->16366 16367 7ff6e8d2d16d GetCurrentProcess GetProcessAffinityMask 16366->16367 16369 7ff6e8d2d164 16366->16369 16370 7ff6e8d2d1d8 16366->16370 16367->16369 16368 7ff6e8d2d1b4 QueryInformationJobObject 16368->16370 16369->16368 16370->16331 16371->16333 16373 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 16372->16373 16374 7ff6e8d25725 16373->16374 16375 7ff6e8d25764 16374->16375 16605 7ff6e8d310f0 16374->16605 16375->16335 16377 7ff6e8d25732 16377->16375 16608 7ff6e8d310d0 16377->16608 16381 7ff6e8d310d0 InitializeCriticalSectionEx 16380->16381 16382 7ff6e8d28196 16381->16382 16382->16330 16383 7ff6e8d23b00 16382->16383 16384 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 16383->16384 16385 7ff6e8d23b1e 16384->16385 16386 7ff6e8d23bba 16385->16386 16610 7ff6e8d27ae0 16385->16610 16386->16339 16388 7ff6e8d23b50 16388->16339 16390 7ff6e8d2ebd6 16389->16390 16391 7ff6e8d2eb2b 16389->16391 16390->16346 16392 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 16391->16392 16393 7ff6e8d2eb4a 16392->16393 16394 7ff6e8d310d0 InitializeCriticalSectionEx 16393->16394 16395 7ff6e8d2eb75 16394->16395 16396 7ff6e8d2ebbe GetSystemTimeAsFileTime 16395->16396 16396->16390 16398 7ff6e8d22236 16397->16398 16399 7ff6e8d2223c 16397->16399 16401 7ff6e8d222b3 16398->16401 16615 7ff6e8d24520 16398->16615 16400 7ff6e8d2e360 8 API calls 16399->16400 16400->16398 16401->16349 16403 7ff6e8d22298 16403->16401 16622 7ff6e8d2fb30 16403->16622 16404 7ff6e8d222a8 16404->16349 16649 7ff6e8d2e570 16406->16649 16408 7ff6e8d2e388 16408->16341 16410 7ff6e8d320c9 16409->16410 16414 7ff6e8d2828b 16409->16414 16411 7ff6e8d3211f GetEnabledXStateFeatures 16410->16411 16410->16414 16412 7ff6e8d32130 16411->16412 16411->16414 16413 7ff6e8d32176 GetEnabledXStateFeatures 16412->16413 16412->16414 16413->16414 16414->16352 16414->16353 16416 7ff6e8d3144a _swprintf_c_l 16415->16416 16653 7ff6e8d2ce80 GetModuleHandleExW 16416->16653 16418 7ff6e8d282bd 16567 7ff6e8d2db00 16419->16567 16421 7ff6e8d33f0e 16422 7ff6e8d2db00 8 API calls 16421->16422 16423 7ff6e8d33f3b 16422->16423 16424 7ff6e8d2db00 8 API calls 16423->16424 16425 7ff6e8d33f63 16424->16425 16426 7ff6e8d2db00 8 API calls 16425->16426 16427 7ff6e8d33f8b 16426->16427 16428 7ff6e8d2db00 8 API calls 16427->16428 16429 7ff6e8d33fb8 16428->16429 16430 7ff6e8d2db00 8 API calls 16429->16430 16431 7ff6e8d33fe0 16430->16431 16432 7ff6e8d2db00 8 API calls 16431->16432 16433 7ff6e8d3400d 16432->16433 16434 7ff6e8d2db00 8 API calls 16433->16434 16435 7ff6e8d34035 16434->16435 16436 7ff6e8d2db00 8 API calls 16435->16436 16437 7ff6e8d3405d 16436->16437 16438 7ff6e8d2db00 8 API calls 16437->16438 16439 7ff6e8d34085 16438->16439 16440 7ff6e8d2db00 8 API calls 16439->16440 16441 7ff6e8d340b2 16440->16441 16442 7ff6e8d2db00 8 API calls 16441->16442 16443 7ff6e8d340df 16442->16443 16572 7ff6e8d2dbd0 16443->16572 16446 7ff6e8d2dbd0 18 API calls 16447 7ff6e8d34130 16446->16447 16448 7ff6e8d2dbd0 18 API calls 16447->16448 16449 7ff6e8d3415e 16448->16449 16450 7ff6e8d2dbd0 18 API calls 16449->16450 16451 7ff6e8d34187 16450->16451 16452 7ff6e8d2dbd0 18 API calls 16451->16452 16453 7ff6e8d341b0 16452->16453 16454 7ff6e8d2dbd0 18 API calls 16453->16454 16455 7ff6e8d341de 16454->16455 16456 7ff6e8d2dbd0 18 API calls 16455->16456 16457 7ff6e8d3420c 16456->16457 16458 7ff6e8d2dbd0 18 API calls 16457->16458 16459 7ff6e8d34235 16458->16459 16460 7ff6e8d2dbd0 18 API calls 16459->16460 16461 7ff6e8d3425e 16460->16461 16462 7ff6e8d2dbd0 18 API calls 16461->16462 16463 7ff6e8d34287 16462->16463 16464 7ff6e8d2dbd0 18 API calls 16463->16464 16465 7ff6e8d342b0 16464->16465 16466 7ff6e8d2dbd0 18 API calls 16465->16466 16467 7ff6e8d342d9 16466->16467 16468 7ff6e8d2dbd0 18 API calls 16467->16468 16469 7ff6e8d34302 16468->16469 16470 7ff6e8d2dbd0 18 API calls 16469->16470 16471 7ff6e8d34330 16470->16471 16472 7ff6e8d2dbd0 18 API calls 16471->16472 16473 7ff6e8d3435e 16472->16473 16474 7ff6e8d2dbd0 18 API calls 16473->16474 16475 7ff6e8d34387 16474->16475 16476 7ff6e8d2dbd0 18 API calls 16475->16476 16477 7ff6e8d343b0 16476->16477 16478 7ff6e8d2dbd0 18 API calls 16477->16478 16479 7ff6e8d343d9 16478->16479 16480 7ff6e8d2dbd0 18 API calls 16479->16480 16481 7ff6e8d34402 16480->16481 16482 7ff6e8d2dbd0 18 API calls 16481->16482 16483 7ff6e8d34430 16482->16483 16484 7ff6e8d2dbd0 18 API calls 16483->16484 16485 7ff6e8d3445e 16484->16485 16486 7ff6e8d2dbd0 18 API calls 16485->16486 16487 7ff6e8d34487 16486->16487 16488 7ff6e8d2dbd0 18 API calls 16487->16488 16489 7ff6e8d344b0 16488->16489 16490 7ff6e8d2dbd0 18 API calls 16489->16490 16491 7ff6e8d344d9 16490->16491 16492 7ff6e8d2dbd0 18 API calls 16491->16492 16493 7ff6e8d34502 16492->16493 16494 7ff6e8d2dbd0 18 API calls 16493->16494 16495 7ff6e8d3452b 16494->16495 16496 7ff6e8d2dbd0 18 API calls 16495->16496 16497 7ff6e8d34554 16496->16497 16498 7ff6e8d2dbd0 18 API calls 16497->16498 16499 7ff6e8d3457d 16498->16499 16500 7ff6e8d2dbd0 18 API calls 16499->16500 16501 7ff6e8d345a6 16500->16501 16502 7ff6e8d2dbd0 18 API calls 16501->16502 16503 7ff6e8d345cf 16502->16503 16504 7ff6e8d2dbd0 18 API calls 16503->16504 16505 7ff6e8d345f8 16504->16505 16506 7ff6e8d2dbd0 18 API calls 16505->16506 16507 7ff6e8d34621 16506->16507 16508 7ff6e8d2dbd0 18 API calls 16507->16508 16509 7ff6e8d3464a 16508->16509 16510 7ff6e8d2dbd0 18 API calls 16509->16510 16511 7ff6e8d34673 16510->16511 16512 7ff6e8d2dbd0 18 API calls 16511->16512 16513 7ff6e8d3469c 16512->16513 16514 7ff6e8d2dbd0 18 API calls 16513->16514 16515 7ff6e8d346c5 16514->16515 16516 7ff6e8d2dbd0 18 API calls 16515->16516 16517 7ff6e8d346ee 16516->16517 16518 7ff6e8d2dbd0 18 API calls 16517->16518 16519 7ff6e8d34717 16518->16519 16520 7ff6e8d2dbd0 18 API calls 16519->16520 16521 7ff6e8d34740 16520->16521 16522 7ff6e8d2dbd0 18 API calls 16521->16522 16523 7ff6e8d34769 16522->16523 16524 7ff6e8d2dbd0 18 API calls 16523->16524 16525 7ff6e8d34792 16524->16525 16526 7ff6e8d2dbd0 18 API calls 16525->16526 16527 7ff6e8d347bb 16526->16527 16528 7ff6e8d2dbd0 18 API calls 16527->16528 16529 7ff6e8d347e4 16528->16529 16530 7ff6e8d2dbd0 18 API calls 16529->16530 16531 7ff6e8d3480d 16530->16531 16532 7ff6e8d2dbd0 18 API calls 16531->16532 16533 7ff6e8d3483b 16532->16533 16534 7ff6e8d2dbd0 18 API calls 16533->16534 16535 7ff6e8d34869 16534->16535 16536 7ff6e8d2dbd0 18 API calls 16535->16536 16537 7ff6e8d34897 16536->16537 16538 7ff6e8d2dbd0 18 API calls 16537->16538 16539 7ff6e8d348c5 16538->16539 16540 7ff6e8d2dbd0 18 API calls 16539->16540 16541 7ff6e8d348f3 16540->16541 16542 7ff6e8d2dbd0 18 API calls 16541->16542 16543 7ff6e8d34921 16542->16543 16544 7ff6e8d2dbd0 18 API calls 16543->16544 16545 7ff6e8d3494a 16544->16545 16546 7ff6e8d2dbd0 18 API calls 16545->16546 16547 7ff6e8d34978 16546->16547 16548 7ff6e8d2dbd0 18 API calls 16547->16548 16549 7ff6e8d349a1 16548->16549 16550 7ff6e8d2dbd0 18 API calls 16549->16550 16551 7ff6e8d349ca 16550->16551 16552 7ff6e8d2dbd0 18 API calls 16551->16552 16553 7ff6e8d349f8 16552->16553 16554 7ff6e8d2dbd0 18 API calls 16553->16554 16555 7ff6e8d2d115 16554->16555 16556 7ff6e8d32b90 GetSystemInfo 16555->16556 16557 7ff6e8d32bd4 16556->16557 16558 7ff6e8d32bd8 GetNumaHighestNodeNumber 16557->16558 16559 7ff6e8d32bfe GetCurrentProcess GetProcessGroupAffinity 16557->16559 16558->16559 16560 7ff6e8d32be7 16558->16560 16561 7ff6e8d32c29 GetLastError 16559->16561 16562 7ff6e8d32c34 16559->16562 16560->16559 16561->16562 16563 7ff6e8d32c56 16562->16563 16599 7ff6e8d32970 GetLogicalProcessorInformationEx 16562->16599 16565 7ff6e8d32cc0 GetCurrentProcess GetProcessAffinityMask 16563->16565 16566 7ff6e8d2d11a 16563->16566 16565->16566 16566->16360 16566->16365 16568 7ff6e8d2db24 16567->16568 16569 7ff6e8d2db28 16568->16569 16570 7ff6e8d2e360 8 API calls 16568->16570 16569->16421 16571 7ff6e8d2db54 16570->16571 16571->16421 16573 7ff6e8d2dbfa 16572->16573 16574 7ff6e8d2dd0f 16572->16574 16575 7ff6e8d2dc07 strcmp 16573->16575 16576 7ff6e8d2dc1f 16573->16576 16577 7ff6e8d2e360 8 API calls 16574->16577 16575->16576 16583 7ff6e8d2dc17 16575->16583 16579 7ff6e8d2dc2c strcmp 16576->16579 16580 7ff6e8d2dc3f 16576->16580 16578 7ff6e8d2dd26 16577->16578 16578->16583 16594 7ff6e8d2e4e0 16578->16594 16579->16580 16579->16583 16581 7ff6e8d2dc4c strcmp 16580->16581 16582 7ff6e8d2dc5f 16580->16582 16581->16582 16581->16583 16584 7ff6e8d2dc6c strcmp 16582->16584 16585 7ff6e8d2dc7f 16582->16585 16583->16446 16584->16583 16584->16585 16587 7ff6e8d2dc8c strcmp 16585->16587 16588 7ff6e8d2dca3 16585->16588 16587->16583 16587->16588 16589 7ff6e8d2dcc7 16588->16589 16590 7ff6e8d2dcb0 strcmp 16588->16590 16591 7ff6e8d2dceb 16589->16591 16592 7ff6e8d2dcd4 strcmp 16589->16592 16590->16583 16590->16589 16591->16574 16593 7ff6e8d2dcf8 strcmp 16591->16593 16592->16583 16592->16591 16593->16574 16593->16583 16595 7ff6e8d2e504 16594->16595 16597 7ff6e8d2e52e 16594->16597 16596 7ff6e8d2e510 _stricmp 16595->16596 16595->16597 16596->16595 16598 7ff6e8d2e545 strtoull 16596->16598 16597->16583 16598->16597 16600 7ff6e8d32b5c 16599->16600 16601 7ff6e8d329a2 GetLastError 16599->16601 16600->16563 16601->16600 16602 7ff6e8d329b1 16601->16602 16602->16600 16603 7ff6e8d329cd GetLogicalProcessorInformationEx 16602->16603 16604 7ff6e8d329f0 16603->16604 16604->16563 16606 7ff6e8d310d0 InitializeCriticalSectionEx 16605->16606 16607 7ff6e8d3112e 16606->16607 16607->16377 16609 7ff6e8d8b0d4 InitializeCriticalSectionEx 16608->16609 16611 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 16610->16611 16612 7ff6e8d27afe 16611->16612 16613 7ff6e8d310d0 InitializeCriticalSectionEx 16612->16613 16614 7ff6e8d27b30 16612->16614 16613->16614 16614->16388 16616 7ff6e8d24532 16615->16616 16617 7ff6e8d2456d 16616->16617 16629 7ff6e8d30f60 CreateEventW 16616->16629 16617->16403 16619 7ff6e8d24544 16619->16617 16630 7ff6e8d2d350 CreateThread 16619->16630 16621 7ff6e8d24563 16621->16403 16623 7ff6e8d2fb47 16622->16623 16624 7ff6e8d2fb4f 16623->16624 16625 7ff6e8d8b4b0 _swprintf_c_l 3 API calls 16623->16625 16624->16404 16628 7ff6e8d2fb81 16625->16628 16626 7ff6e8d2fc15 16626->16404 16628->16626 16633 7ff6e8d357e0 16628->16633 16629->16619 16631 7ff6e8d2d37f 16630->16631 16632 7ff6e8d2d385 SetThreadPriority ResumeThread FindCloseChangeNotification 16630->16632 16631->16621 16632->16621 16634 7ff6e8d35813 _swprintf_c_l 16633->16634 16638 7ff6e8d35839 _swprintf_c_l 16634->16638 16639 7ff6e8d36920 16634->16639 16636 7ff6e8d35830 16637 7ff6e8d310d0 InitializeCriticalSectionEx 16636->16637 16636->16638 16637->16638 16638->16628 16638->16638 16640 7ff6e8d32ee0 3 API calls 16639->16640 16641 7ff6e8d36942 16640->16641 16642 7ff6e8d3694a 16641->16642 16643 7ff6e8d32e10 3 API calls 16641->16643 16642->16636 16644 7ff6e8d36968 16643->16644 16647 7ff6e8d36973 _swprintf_c_l 16644->16647 16648 7ff6e8d32ec0 VirtualFree 16644->16648 16646 7ff6e8d36a8e 16646->16636 16647->16636 16648->16646 16650 7ff6e8d2e5a6 16649->16650 16651 7ff6e8d8b490 8 API calls 16650->16651 16652 7ff6e8d2e64a 16651->16652 16652->16408 16653->16418 16654 7ff6e8d220b0 16655 7ff6e8d220e0 16654->16655 16656 7ff6e8d22178 16655->16656 16657 7ff6e8d38d69 3 API calls 16655->16657 16658 7ff6e8d38dcb 18 API calls 16655->16658 16657->16656 16658->16656 16659 7ff6e8d538b0 16660 7ff6e8d538ed 16659->16660 16662 7ff6e8d53917 16659->16662 16661 7ff6e8d32570 10 API calls 16660->16661 16661->16662

        Control-flow Graph

        APIs
        • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32B9F
        • GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32BDD
        • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32C09
        • GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32C1A
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32C29
        • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32CC0
        • GetProcessAffinityMask.KERNEL32 ref: 00007FF6E8D32CD3
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Process$AffinityCurrent$ErrorGroupHighestInfoLastMaskNodeNumaNumberSystem
        • String ID:
        • API String ID: 580471860-0
        • Opcode ID: 4c9e7b62ca1d93063124db9da2326d3f3828c88f021132ba50495a9616bc8b52
        • Instruction ID: 511975474950c2cfc11118fc4d3c2c85d907aefd95b35aff51cb47286bf26f47
        • Opcode Fuzzy Hash: 4c9e7b62ca1d93063124db9da2326d3f3828c88f021132ba50495a9616bc8b52
        • Instruction Fuzzy Hash: 43515133E1874686EB508F29E4443B963A1FB44B81F840232D94DC7365EE3EE909D74E

        Control-flow Graph

        APIs
          • Part of subcall function 00007FF6E8D2D0F0: FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF6E8D2813F,?,?,?,?,?,?,00007FF6E8D22000), ref: 00007FF6E8D2D0FB
          • Part of subcall function 00007FF6E8D2D0F0: QueryInformationJobObject.KERNEL32 ref: 00007FF6E8D2D1CE
          • Part of subcall function 00007FF6E8D2CE80: GetModuleHandleExW.KERNEL32(?,?,?,?,00007FF6E8D28168,?,?,?,?,?,?,00007FF6E8D22000), ref: 00007FF6E8D2CE91
        • RtlAddVectoredExceptionHandler.NTDLL ref: 00007FF6E8D281C9
        • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00007FF6E8D22000), ref: 00007FF6E8D282B3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Exception$AllocFailFastHandleHandlerInformationModuleObjectQueryRaiseVectored
        • String ID: The required instruction sets are not supported by the current CPU.$StressLogLevel$TotalStressLogSize
        • API String ID: 2052584837-2841289747
        • Opcode ID: d0ac9821fb6c0add4b9ebbe98daa48ccbd8c985c351c2d863065a78766f66ba6
        • Instruction ID: 766208fc27449bf9637b1f9c2bafd8caef5c749779c072f4a234ccba258d2326
        • Opcode Fuzzy Hash: d0ac9821fb6c0add4b9ebbe98daa48ccbd8c985c351c2d863065a78766f66ba6
        • Instruction Fuzzy Hash: 18417D33E58A4281E610AB70A9027B96391AF41795F480331E94DE769BCF2EE85DC71F

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 260 7ff6e8d8bda4-7ff6e8d8bdad 261 7ff6e8d8bdbe-7ff6e8d8bdc6 malloc 260->261 262 7ff6e8d8bdaf-7ff6e8d8bdb9 call 7ff6e8d8f601 261->262 263 7ff6e8d8bdc8-7ff6e8d8bdcd 261->263 266 7ff6e8d8bdce-7ff6e8d8bdd2 262->266 267 7ff6e8d8bdbb 262->267 268 7ff6e8d8bdd4-7ff6e8d8bdd9 call 7ff6e8d8c204 266->268 269 7ff6e8d8bdda-7ff6e8d8be39 call 7ff6e8d8c224 266->269 267->261 268->269 274 7ff6e8d8be96 269->274 275 7ff6e8d8be3b-7ff6e8d8be58 269->275 276 7ff6e8d8be9d-7ff6e8d8bead 274->276 277 7ff6e8d8be82-7ff6e8d8be94 275->277 278 7ff6e8d8be5a-7ff6e8d8be5f 275->278 279 7ff6e8d8beaf-7ff6e8d8becc 276->279 280 7ff6e8d8bf14-7ff6e8d8bf43 276->280 277->276 278->277 281 7ff6e8d8be61-7ff6e8d8be66 278->281 282 7ff6e8d8bece-7ff6e8d8bed2 279->282 283 7ff6e8d8bed9-7ff6e8d8bedc 279->283 284 7ff6e8d8bf60-7ff6e8d8bf64 280->284 285 7ff6e8d8bf45-7ff6e8d8bf5a 280->285 281->277 286 7ff6e8d8be68-7ff6e8d8be70 281->286 282->283 287 7ff6e8d8bede-7ff6e8d8bef4 283->287 288 7ff6e8d8bef7-7ff6e8d8beff 283->288 289 7ff6e8d8c095-7ff6e8d8c0a9 284->289 290 7ff6e8d8bf6a-7ff6e8d8bf7e 284->290 285->284 286->274 291 7ff6e8d8be72-7ff6e8d8be80 286->291 287->288 288->280 292 7ff6e8d8bf01-7ff6e8d8bf11 288->292 293 7ff6e8d8bf84-7ff6e8d8bf8c 290->293 294 7ff6e8d8c07a-7ff6e8d8c07f 290->294 291->274 291->277 292->280 293->294 296 7ff6e8d8bf92-7ff6e8d8bfb1 293->296 294->289 295 7ff6e8d8c081-7ff6e8d8c08a 294->295 295->289 297 7ff6e8d8c08c 295->297 298 7ff6e8d8c010 296->298 299 7ff6e8d8bfb3-7ff6e8d8bfe3 296->299 297->289 300 7ff6e8d8c017-7ff6e8d8c01b 298->300 299->300 301 7ff6e8d8bfe5-7ff6e8d8bfed 299->301 303 7ff6e8d8c029-7ff6e8d8c02e 300->303 304 7ff6e8d8c01d-7ff6e8d8c022 300->304 301->298 302 7ff6e8d8bfef-7ff6e8d8c00e 301->302 302->300 303->294 305 7ff6e8d8c030-7ff6e8d8c038 303->305 304->303 305->294 306 7ff6e8d8c03a-7ff6e8d8c06d 305->306 306->294 307 7ff6e8d8c06f-7ff6e8d8c073 306->307 307->294
        APIs
        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6E8D8B4B9,?,?,?,?,00007FF6E8D2E7A1,?,?,?,00007FF6E8D2ED24,00000000,00000020,?), ref: 00007FF6E8D8BDBE
        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6E8D8BDD4
          • Part of subcall function 00007FF6E8D8C204: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF6E8D8C20D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Concurrency::cancel_current_taskmallocstd::bad_alloc::bad_alloc
        • String ID:
        • API String ID: 205171174-0
        • Opcode ID: bf961b2ab8b72b6bb4696f625dc9e1acb4f646454a2333270e2ccd61e10cc9a7
        • Instruction ID: 024fdafe9b6d0762a2ca26adfeae04cfd7a6158d3ee954b470d94bf7f79155e2
        • Opcode Fuzzy Hash: bf961b2ab8b72b6bb4696f625dc9e1acb4f646454a2333270e2ccd61e10cc9a7
        • Instruction Fuzzy Hash: B8818C73E186428EF7548F39A8417A837E0AB053A4F10673AD96EC76E0CE3EA444974D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CurrentProcess
        • String ID:
        • API String ID: 2050909247-0
        • Opcode ID: 7ac183430c0cba639e3ecd960606325245119737f18878573bcb73a7c9d029aa
        • Instruction ID: 36aca88756dc40bf7cebe8526e987bf1deb2c7c57f6f138fa195ba9f17abad7b
        • Opcode Fuzzy Hash: 7ac183430c0cba639e3ecd960606325245119737f18878573bcb73a7c9d029aa
        • Instruction Fuzzy Hash: C7028D73E2874686FA1A8B39A8413B876A2EF567C0F144736D40DD3260DF3FB485964E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3394052d9c2137c2fbf3b89c3610aa84990dc952498e98284b1c9c34880cd2ed
        • Instruction ID: 49a03e75a385903dc1a67e76147e9a53e7299edf0e02e59e411d1923a4d9d80f
        • Opcode Fuzzy Hash: 3394052d9c2137c2fbf3b89c3610aa84990dc952498e98284b1c9c34880cd2ed
        • Instruction Fuzzy Hash: D5F19233D2DB4386F646DB34A9113B56251AFA57C0F149336E40DD32A2EF2FB894924E

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: GlobalMemoryStatus$Process$CurrentInformationObjectQuery
        • String ID: @$@$@
        • API String ID: 2645093340-1177533131
        • Opcode ID: 46198da623394d7b15bb719f5e4a5128e58e6380a5aeb4f160e59a8db540b038
        • Instruction ID: 2d0fb548056b26970c8aa4d16f3c7bcfde0979b83a90ed4b4a89a20b5dee8bc3
        • Opcode Fuzzy Hash: 46198da623394d7b15bb719f5e4a5128e58e6380a5aeb4f160e59a8db540b038
        • Instruction Fuzzy Hash: CC416733A08BC189EB718F21E4143A9B360FB44BA4F584335DAAD93AD8DF3DD8448749

        Control-flow Graph

        APIs
        • FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF6E8D2813F,?,?,?,?,?,?,00007FF6E8D22000), ref: 00007FF6E8D2D0FB
          • Part of subcall function 00007FF6E8D32B90: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32B9F
          • Part of subcall function 00007FF6E8D32B90: GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32BDD
          • Part of subcall function 00007FF6E8D32B90: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32C09
          • Part of subcall function 00007FF6E8D32B90: GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32C1A
          • Part of subcall function 00007FF6E8D32B90: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D2D11A), ref: 00007FF6E8D32C29
        • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,00007FF6E8D2813F,?,?,?,?,?,?,00007FF6E8D22000), ref: 00007FF6E8D2D16D
        • GetProcessAffinityMask.KERNEL32 ref: 00007FF6E8D2D180
        • QueryInformationJobObject.KERNEL32 ref: 00007FF6E8D2D1CE
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Process$AffinityCurrent$AllocErrorGroupHighestInfoInformationLastMaskNodeNumaNumberObjectQuerySystem
        • String ID: PROCESSOR_COUNT
        • API String ID: 1701933505-4048346908
        • Opcode ID: 25420fbf59497c97a6a616538860f2c47e8523c816d87657a417c9793d34a5e2
        • Instruction ID: 186c402da757dba5a700c4fb5b7f914fedc1857e564dd25f73581031c14dfc36
        • Opcode Fuzzy Hash: 25420fbf59497c97a6a616538860f2c47e8523c816d87657a417c9793d34a5e2
        • Instruction Fuzzy Hash: 1931A033A08A4686EB259B70E8443B963A1EF84394F440231D68DC7B95DF3EE80DC75E

        Control-flow Graph

        APIs
        Strings
        • Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code., xrefs: 00007FF6E8D23726
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ExceptionFailFastRaise$Sleep
        • String ID: Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code.
        • API String ID: 3706814929-926682358
        • Opcode ID: 6d01acea836dd96b47c2c5e0993a22bc70c2472d024c1f230ebefcf46e4bbae2
        • Instruction ID: 12d48b244f99293f42acedc32584ef4ff9e6105426d75bae2c75d90d66228b58
        • Opcode Fuzzy Hash: 6d01acea836dd96b47c2c5e0993a22bc70c2472d024c1f230ebefcf46e4bbae2
        • Instruction Fuzzy Hash: 4B412C73A18A4682EB999B35E5543A933A4EB44794F144239CA4DC33B0CF3FE459D28E

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Thread$ChangeCloseCreateFindNotificationPriorityResume
        • String ID:
        • API String ID: 2150560229-0
        • Opcode ID: 1fd97627cfe8389e38b2286a366fd33d3ebac3e1f7f8eb4fcf4620db7d9795ed
        • Instruction ID: 24b1d3fb1b90bc0b3ee6c5c05c7481155e5ec59c2ac406328e454b2b4b09cc6a
        • Opcode Fuzzy Hash: 1fd97627cfe8389e38b2286a366fd33d3ebac3e1f7f8eb4fcf4620db7d9795ed
        • Instruction Fuzzy Hash: D6E06DA6A1571282FB259B71A8283396350BF98BC5F084034DD8E963A4EF3E9155868C

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 175 7ff6e8d32570-7ff6e8d325a1 176 7ff6e8d325a7-7ff6e8d325c2 GetCurrentProcess call 7ff6e8d8b0da 175->176 177 7ff6e8d3265f-7ff6e8d3267c GlobalMemoryStatusEx 175->177 176->177 188 7ff6e8d325c8-7ff6e8d325d0 176->188 179 7ff6e8d32702-7ff6e8d32705 177->179 180 7ff6e8d32682-7ff6e8d32685 177->180 184 7ff6e8d32707-7ff6e8d3270b 179->184 185 7ff6e8d3270e-7ff6e8d32711 179->185 182 7ff6e8d32687-7ff6e8d32692 180->182 183 7ff6e8d326f1-7ff6e8d326f4 180->183 189 7ff6e8d3269b-7ff6e8d326ac 182->189 190 7ff6e8d32694-7ff6e8d32699 182->190 191 7ff6e8d326f9-7ff6e8d326fc 183->191 192 7ff6e8d326f6 183->192 184->185 186 7ff6e8d3271b-7ff6e8d3271e 185->186 187 7ff6e8d32713-7ff6e8d32718 185->187 193 7ff6e8d32728-7ff6e8d3274b call 7ff6e8d8b490 186->193 194 7ff6e8d32720 186->194 187->186 195 7ff6e8d3263a-7ff6e8d3263f 188->195 196 7ff6e8d325d2-7ff6e8d325d8 188->196 197 7ff6e8d326b0-7ff6e8d326c1 189->197 190->197 191->193 198 7ff6e8d326fe-7ff6e8d32700 191->198 192->191 199 7ff6e8d32725 194->199 205 7ff6e8d32651-7ff6e8d32654 195->205 206 7ff6e8d32641-7ff6e8d32644 195->206 200 7ff6e8d325da-7ff6e8d325df 196->200 201 7ff6e8d325e1-7ff6e8d325f5 196->201 203 7ff6e8d326ca-7ff6e8d326de 197->203 204 7ff6e8d326c3-7ff6e8d326c8 197->204 198->199 199->193 208 7ff6e8d325f9-7ff6e8d3260a 200->208 201->208 210 7ff6e8d326e2-7ff6e8d326ee 203->210 204->210 205->193 207 7ff6e8d3265a 205->207 211 7ff6e8d32646-7ff6e8d32649 206->211 212 7ff6e8d3264b-7ff6e8d3264e 206->212 207->199 213 7ff6e8d3260c-7ff6e8d32611 208->213 214 7ff6e8d32613-7ff6e8d32627 208->214 210->183 211->205 212->205 215 7ff6e8d3262b-7ff6e8d32637 213->215 214->215 215->195
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CurrentGlobalMemoryProcessStatus
        • String ID: @
        • API String ID: 3261791682-2766056989
        • Opcode ID: d415d27f6ddf2cca45eba18734769ddeecb613225847b9f00db101291d5e82da
        • Instruction ID: f8bbc5146ee165e9ecdc28c6303241481f6f6751a102b8a2b10398ac37a694dd
        • Opcode Fuzzy Hash: d415d27f6ddf2cca45eba18734769ddeecb613225847b9f00db101291d5e82da
        • Instruction Fuzzy Hash: D2412963F19B4649E956CB36911833992927F49BC2F18C731ED0EA2744FF3EE885860D

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Count64Tick
        • String ID: D)
        • API String ID: 1927824332-848725745
        • Opcode ID: 738b33bdc5b30434fa873a3cc482db2f0a1aff3c0c979400cab83d7b5406ce2f
        • Instruction ID: c20c27659e7bc35cae15741762dc0cde7cd895defbfba005042cfe4848197f52
        • Opcode Fuzzy Hash: 738b33bdc5b30434fa873a3cc482db2f0a1aff3c0c979400cab83d7b5406ce2f
        • Instruction Fuzzy Hash: 1F416D33E1964689EA658B31E4483BD2390BF40780F154736C90DE36A4DE3FE959A34F

        Control-flow Graph

        APIs
        • VirtualAlloc.KERNELBASE(?,?,?,?,00000000,00007FF6E8D36968,?,?,0000000B,00007FF6E8D35830,?,?,00000000,00007FF6E8D2FBF1), ref: 00007FF6E8D32E37
        • GetCurrentProcess.KERNEL32(?,?,?,?,00000000,00007FF6E8D36968,?,?,0000000B,00007FF6E8D35830,?,?,00000000,00007FF6E8D2FBF1), ref: 00007FF6E8D32E57
        • VirtualAllocExNuma.KERNEL32 ref: 00007FF6E8D32E78
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: AllocVirtual$CurrentNumaProcess
        • String ID:
        • API String ID: 647533253-0
        • Opcode ID: 5188d5bc0a99c14dc0d2229a5aba8e7e5169a6da6aec5c86698c49050b78a37c
        • Instruction ID: af99809a88ab0307066986181f13bdd4a042a46f725b0fa4e8547cb5e4c9371b
        • Opcode Fuzzy Hash: 5188d5bc0a99c14dc0d2229a5aba8e7e5169a6da6aec5c86698c49050b78a37c
        • Instruction Fuzzy Hash: ECF04472B1869182E7208F16F404719A760BB49BD5F584135EF8C67B6CDF3DD5918708

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Virtual$AllocFree
        • String ID:
        • API String ID: 2087232378-0
        • Opcode ID: 3b0924aad5c9d8f1e4054d63f84a8e7ac6c370ab154e50dab9d8d9c549d06468
        • Instruction ID: ec553add9051778baabad0ec119b96753aeddacbdaea1fa0421f9372e54a441e
        • Opcode Fuzzy Hash: 3b0924aad5c9d8f1e4054d63f84a8e7ac6c370ab154e50dab9d8d9c549d06468
        • Instruction Fuzzy Hash: 8BE0C235F2A20182EB2C9F33A84676813916F4DB50FC0C038C40D93350EE3EA55B8F8A

        Control-flow Graph

        APIs
        • CoInitializeEx.OLE32(?,?,?,?,00000030,?,?,?,?,?,?,?,00007FF6E8DCCE70,?,?,00000030), ref: 00007FF6E8DCD029
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Initialize
        • String ID:
        • API String ID: 2538663250-0
        • Opcode ID: d260e6bf7434607846c4d61dd018d3f30570e5d6e4ce6bbd326d91653f400847
        • Instruction ID: d28a52cdec69cd8e3bb3959a35427373adaccb526bbc70694d5d703ef54a39d9
        • Opcode Fuzzy Hash: d260e6bf7434607846c4d61dd018d3f30570e5d6e4ce6bbd326d91653f400847
        • Instruction Fuzzy Hash: F831B223E0861685FA12AB75EC117FD62606F44794F540235DE0DEB786DE3EA88AC34E

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CurrentExceptionFailFastQueryRaiseThreadVirtual
        • String ID:
        • API String ID: 2131581837-0
        • Opcode ID: c64ecd0e409d3fcf1060a1dc3232f901697416edb1e454c4f82bff6a62ba27d3
        • Instruction ID: 7980493a4baac2de67820530f02d63c9a4379d27701e8994e5418ae1ca33db9a
        • Opcode Fuzzy Hash: c64ecd0e409d3fcf1060a1dc3232f901697416edb1e454c4f82bff6a62ba27d3
        • Instruction Fuzzy Hash: D4114C72A08B8282D764AF25B4012AAB350F7457B0F544339E6BD477D6DF3DD14A870A
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: FreeVirtual
        • String ID:
        • API String ID: 1263568516-0
        • Opcode ID: c77d0b216ed602b1f63c297f10537e1da20961e91553004aa9498b52e676b055
        • Instruction ID: 1a9f4ffe1257d6547e7e312cf83ca45f82e5e911f14c2041e647967e8caf5a69
        • Opcode Fuzzy Hash: c77d0b216ed602b1f63c297f10537e1da20961e91553004aa9498b52e676b055
        • Instruction Fuzzy Hash: 0EB01200F2A111C2E3182B337C82B0C03142B09B62FC40024C608F1350CD3DC1E51B19
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BreakOnOOM$CompactRatio$ConcurrentGC$ConfigLogEnabled$ConfigLogFile$ConservativeGC$ForceCompact$GCConfigLogFile$GCConserveMem$GCCpuGroup$GCDTargetTCP$GCDynamicAdaptationMode$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapAffinitizeRanges$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLargePages$GCLogFile$GCLowSkipRatio$GCName$GCNumaAware$GCPath$GCProvModeStress$GCRegionRange$GCRegionSize$GCSpinCountUnit$GCTotalPhysicalMemory$Gen0Size$HeapCount$HeapVerifyLevel$LOHCompactionMode$LOHThreshold$LatencyLevel$LatencyMode$LogEnabled$LogFile$LogFileSize$MaxHeapCount$NoAffinitize$RetainVM$SegmentSize$ServerGC$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.DTargetTCP$System.GC.DynamicAdaptationMode$System.GC.HeapAffinitizeMask$System.GC.HeapAffinitizeRanges$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LOHThreshold$System.GC.LargePages$System.GC.MaxHeapCount$System.GC.Name$System.GC.NoAffinitize$System.GC.Path$System.GC.RetainVM$System.GC.Server
        • API String ID: 0-1379766591
        • Opcode ID: d99b99d8d7d8079bc8fcfdef839217da97d7cae1de85db9ed7a85a6efaf86363
        • Instruction ID: dcc31fa36a7392fa3f27b4d82f4a2eee49782953278cf07dba11df2b73f7b2ff
        • Opcode Fuzzy Hash: d99b99d8d7d8079bc8fcfdef839217da97d7cae1de85db9ed7a85a6efaf86363
        • Instruction Fuzzy Hash: BE427E72A18A5681EB209B35F910BE963A5FF457C8F411232D98C87B24DF3ED246C74E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: strcmp
        • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$GCBreakOnOOM$GCCompactRatio$GCConfigLogEnabled$GCConserveMemory$GCCpuGroup$GCDTargetTCP$GCDynamicAdaptationMode$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapCount$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLOHCompact$GCLOHThreshold$GCLargePages$GCLatencyLevel$GCLatencyMode$GCLogEnabled$GCLogFileSize$GCLowSkipRatio$GCMaxHeapCount$GCNoAffinitize$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCRetainVM$GCSegmentSize$GCSpinCountUnit$GCTotalPhysicalMemory$GCWriteBarrier$GCgen0size$HeapVerify$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.DTargetTCP$System.GC.DynamicAdaptationMode$System.GC.HeapAffinitizeMask$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LOHThreshold$System.GC.LargePages$System.GC.MaxHeapCount$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server$gcConcurrent$gcConservative$gcForceCompact$gcServer
        • API String ID: 1004003707-1492036319
        • Opcode ID: 4191eb02c31c6530e6ec1d622d11567a61af9ffd1ff6ecc5b188b8cc01225dc0
        • Instruction ID: a03165b1e106ce4cded03c6d082fca45f37d3c8b5ed091029055fa84a876cd5d
        • Opcode Fuzzy Hash: 4191eb02c31c6530e6ec1d622d11567a61af9ffd1ff6ecc5b188b8cc01225dc0
        • Instruction Fuzzy Hash: F862B132E29B8B94EA01DB75A8543E127A1EF557D0F444232C44CC7262EE3FA159E39F
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Process$AllocCurrentTokenVirtual$AdjustCloseErrorHandleLargeLastLookupMinimumNumaOpenPagePrivilegePrivilegesValue
        • String ID: SeLockMemoryPrivilege
        • API String ID: 1752251271-475654710
        • Opcode ID: 15b15ab6d6ee02b3c5b0b81b0fa05c43a8a43f1a4b1e1b9cf4b9317159724ae4
        • Instruction ID: b4f8f96228693e4d32cc21c24a68df4e627d0278d4c4d1b6d8671814297b294e
        • Opcode Fuzzy Hash: 15b15ab6d6ee02b3c5b0b81b0fa05c43a8a43f1a4b1e1b9cf4b9317159724ae4
        • Instruction Fuzzy Hash: 5231A133A1CB4286FB209BB1F50877A67A1EB84BC4F000135DA8D97769DE3ED448874E
        APIs
        • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF6E8D27871), ref: 00007FF6E8D26F88
        • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF6E8D27871), ref: 00007FF6E8D270DB
        • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF6E8D27871), ref: 00007FF6E8D271B3
        • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF6E8D27871), ref: 00007FF6E8D271C9
        • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF6E8D27871), ref: 00007FF6E8D27245
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ExceptionFailFastRaise
        • String ID: [ KeepUnwinding ]
        • API String ID: 2546344036-400895726
        • Opcode ID: a194a7c0d0f8bf0d13eda8b02fc6739eea9f927413269e725c7a1e9c4323ee48
        • Instruction ID: 693a3b4e6708a63bfc84e51af279404015bac0b5bf44a506e948d6afd0b483e9
        • Opcode Fuzzy Hash: a194a7c0d0f8bf0d13eda8b02fc6739eea9f927413269e725c7a1e9c4323ee48
        • Instruction Fuzzy Hash: CAB12933A09B4281EB64CF35E4407A923A5FB44B68F584236DA4D87398DF3EE459C35A
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 78dc8e12354e733f786b704134a88d0c69524484bd1249ff473f58f1b1045164
        • Instruction ID: af7fe1bb5aec07faff1687d06b9e96859326d18a9331ab669c87a2306576567a
        • Opcode Fuzzy Hash: 78dc8e12354e733f786b704134a88d0c69524484bd1249ff473f58f1b1045164
        • Instruction Fuzzy Hash: 51114C22B14F028AEB009F70E8542A933A4FB18798F041E31DA6D837A8DF78D1548384
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: SwitchThread
        • String ID:
        • API String ID: 115865932-0
        • Opcode ID: 9c30da41b46e678a752cba94ff24b9c9e844bb868ff036e56f0bec62d5d1427a
        • Instruction ID: 76721a7f639f2e60e7106e1ea2360103318809ff79db6f70f0a8e0280bbddf00
        • Opcode Fuzzy Hash: 9c30da41b46e678a752cba94ff24b9c9e844bb868ff036e56f0bec62d5d1427a
        • Instruction Fuzzy Hash: E7B15B73A19B42C6EA188B78D4443B833A0FF45B94F544736DA1DC72A5DE3EE458838E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID: @
        • API String ID: 3168844106-2766056989
        • Opcode ID: 5db7b6a377614d9f480f265109a2fe80749a182d1a3adcd727705f5ae378369e
        • Instruction ID: 94d223ef27747ee4785c5a79d8f90d1cb42a857dbf87f49e475b7bc9e4a33b30
        • Opcode Fuzzy Hash: 5db7b6a377614d9f480f265109a2fe80749a182d1a3adcd727705f5ae378369e
        • Instruction Fuzzy Hash: 1E914833E2964285FB629B35A8443B423A0AF457D4F180335D90DC36A5DE2FF858EB5E
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: SwitchThread
        • String ID:
        • API String ID: 115865932-0
        • Opcode ID: c2dd94c7d96df3f2775cdd799debc1e0e9d9a61e5e2074260edde2e60430f6ac
        • Instruction ID: d46ea87a75e3daad9d7b76207601e71345f1cdee682985c595e2da2e31c1f3fe
        • Opcode Fuzzy Hash: c2dd94c7d96df3f2775cdd799debc1e0e9d9a61e5e2074260edde2e60430f6ac
        • Instruction Fuzzy Hash: 46E16F33A09B91C6EB609F25E4403A9B364FB44B94F544232DA9D83798DF3DE449CB4E
        APIs
        • GetEnabledXStateFeatures.KERNEL32(?,?,?,?,?,00007FF6E8D2828B,?,?,?,?,?,?,00007FF6E8D22000), ref: 00007FF6E8D3211F
        • GetEnabledXStateFeatures.KERNEL32(?,?,?,?,?,00007FF6E8D2828B,?,?,?,?,?,?,00007FF6E8D22000), ref: 00007FF6E8D3217C
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: EnabledFeaturesState
        • String ID:
        • API String ID: 1557480591-0
        • Opcode ID: 72210cc46d501d66917d4aa4741235ebaad592b546a2f8b3c708735d4c7245cd
        • Instruction ID: 7ad90f8175b3a71efde68cf865cf9eab0d7d2dd189648be90db006563fdff08e
        • Opcode Fuzzy Hash: 72210cc46d501d66917d4aa4741235ebaad592b546a2f8b3c708735d4c7245cd
        • Instruction Fuzzy Hash: 8151E237F082220AFF68046D985D77542875BE5366F568638DA5EE36C2CD7FEC0A420E
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID:
        • API String ID: 3168844106-0
        • Opcode ID: d59cc5cb1b18531cba8ca60925d5e3cb69ecf232ff52c5df66362fa8286c3256
        • Instruction ID: a24f5c207783db7d502d1e1fc53bbc16284e2bcf376f12267c6de68729f81401
        • Opcode Fuzzy Hash: d59cc5cb1b18531cba8ca60925d5e3cb69ecf232ff52c5df66362fa8286c3256
        • Instruction Fuzzy Hash: D1418033B28A5681EB109F36A5503B963A4FF88BC4B185236DE4C93B55DF3EE016834D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3916222277
        • Opcode ID: d80cb2096afa2d96802b29f732793f8d2c2ea0a515708a2f5b61d075e09ca355
        • Instruction ID: 154fd31eec7e9dbe96925af4bf9a13573b3becfddbd0a004223dc718ff8440aa
        • Opcode Fuzzy Hash: d80cb2096afa2d96802b29f732793f8d2c2ea0a515708a2f5b61d075e09ca355
        • Instruction Fuzzy Hash: 20426A73A29B86C1EA128B65E9107B837A1FB447E4F544332CA6D83790DF3EE454934E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID: ?
        • API String ID: 0-1684325040
        • Opcode ID: d973c782404e594d9bcbf2e5c6d56061f7dad822c0a4488c5f43b24ac340032d
        • Instruction ID: e1d4f3abd04edb161f8c66ee3e952f93738ced9c33237a05d6cca536cefc9a33
        • Opcode Fuzzy Hash: d973c782404e594d9bcbf2e5c6d56061f7dad822c0a4488c5f43b24ac340032d
        • Instruction Fuzzy Hash: A412CD33A18B4A82EB54CB21E4447A973A5FB94B94F144331CA5E83794CF3EE84AC74D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID: 0
        • API String ID: 0-4108050209
        • Opcode ID: ed46fb5e053d378f1610507a2dc2373cd927df4da4c90f69d846193864f28d75
        • Instruction ID: ffb216dc257d49f8752670c18d3a2811b8323450518f79cd94c08f7b027cae4d
        • Opcode Fuzzy Hash: ed46fb5e053d378f1610507a2dc2373cd927df4da4c90f69d846193864f28d75
        • Instruction Fuzzy Hash: 49D1CDB3B10B4983E7189F39A40566932A2EB45BE8F141335DE5D47B98CE3DE918C748
        APIs
        • GetLocaleInfoEx.KERNEL32(?,?,?,?,?,00000010,0000022E8D4002C0,?,?,00000000,?,?,00007FF6E8DBE953), ref: 00007FF6E8DF0D86
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: InfoLocale
        • String ID:
        • API String ID: 2299586839-0
        • Opcode ID: 204640446f1087154f6338ca72d232791813a4a0625229ff24d57606c327cb8e
        • Instruction ID: eca6f1be20d028214924e544d0bb3886225f881d75091dbaa5a47e1eb1c36513
        • Opcode Fuzzy Hash: 204640446f1087154f6338ca72d232791813a4a0625229ff24d57606c327cb8e
        • Instruction Fuzzy Hash: 0A01E533F04B549AEB21DBB5AC015ED76B4B758318F60023AEE4DA7A48EF34A856C744
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID: /1
        • API String ID: 0-2817764555
        • Opcode ID: 7f6dc304a19f2a48ee2c861db27342cb39ee3eea17acda9183df1afc939c6c05
        • Instruction ID: 5da276687594b95f276a1fa8523674b6de6e33133bd43e242089475db398ed1d
        • Opcode Fuzzy Hash: 7f6dc304a19f2a48ee2c861db27342cb39ee3eea17acda9183df1afc939c6c05
        • Instruction Fuzzy Hash: 6FD16F33A59B8682E7608B34E8443B923A1FF48798F154235C94D93761DF3EE859D34E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 25344163fb3e352c34538291974fad36bcb5627af75f838acfed12e2fba72d91
        • Instruction ID: 7097690d5cae6a68c7fd8437a83a37395b780b30ad144a2206a384bb67ea0098
        • Opcode Fuzzy Hash: 25344163fb3e352c34538291974fad36bcb5627af75f838acfed12e2fba72d91
        • Instruction Fuzzy Hash: 1A92BD73A28B0685EA029B75A9507B463A5FF48BC4F584337D80ED3761DE3EE449834E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 801744bdd96377547b888a3c70e772e67b1585d8fb76d1f3f959e3ca14fd2e86
        • Instruction ID: 0225a3586973f3313de1c57b03c7191b60ed3202812ed69a3e8e57af86000491
        • Opcode Fuzzy Hash: 801744bdd96377547b888a3c70e772e67b1585d8fb76d1f3f959e3ca14fd2e86
        • Instruction Fuzzy Hash: 7052AB33B18B45C6EB108F75E4402AD77B1FB48B98B144636EE4E97B98CE3AE445870D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 781d2a1a5c9ba1d80fa3332f439c67dbd3f5da6a5da9899e467eda87960517b7
        • Instruction ID: e73b83e375ddc2d13fe70a5a92af95f277df5a046fe0624c33c6a9ff05da20fc
        • Opcode Fuzzy Hash: 781d2a1a5c9ba1d80fa3332f439c67dbd3f5da6a5da9899e467eda87960517b7
        • Instruction Fuzzy Hash: AF327E33B19B46C6EB108BB5D5407BC27A1FB04BA8B244636CE1D97B84DE39E459C34E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 12364d0ff0cea06089e9274694b767b8b30ef639dd9b265c612d6c852c853e6b
        • Instruction ID: b118f299aefd44842ecef92d6e7628159c526c572731a829892366c774bc59ee
        • Opcode Fuzzy Hash: 12364d0ff0cea06089e9274694b767b8b30ef639dd9b265c612d6c852c853e6b
        • Instruction Fuzzy Hash: 0D1280B3A1AB9A81EE658B28D04436867A0FF54BA4F149335CE6C833D4DF3ED495C24D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 313dea30c798e73606019446f4cb135ba51061c0bfdcea6891a82da26de4cdd6
        • Instruction ID: 7a9368d07408b008c4505d05e2f3e96b818e1dd5f5ce71d06e769e6699c5cf0d
        • Opcode Fuzzy Hash: 313dea30c798e73606019446f4cb135ba51061c0bfdcea6891a82da26de4cdd6
        • Instruction Fuzzy Hash: F6F16963F2854242F73A47389C017B96252EFD1304F589734DA4E96BD8EE3EA45D8F0A
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 00ca48302f7e549fd0b9dcb0b29a96f96b9d26f61ae64e1577846578a65f7f54
        • Instruction ID: e9d31c395f430899a87a699ee0e24408fe6dba7438a5f6bb73c7f5bd36101c54
        • Opcode Fuzzy Hash: 00ca48302f7e549fd0b9dcb0b29a96f96b9d26f61ae64e1577846578a65f7f54
        • Instruction Fuzzy Hash: 7E02A073A19A868AEA048B35D4447BC77A0EB85BA4F444335DA2D877D0CF3EE446D34E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CounterPerformanceQuery
        • String ID:
        • API String ID: 2783962273-0
        • Opcode ID: dbabca0daaad52e6d2fee9b053951e65599bec3c22e1c459a219101abfb20a77
        • Instruction ID: b4a698fa099fdc7ca160bbcb644b4f2ead3dad8764b857e716ad8ef0cbdc7895
        • Opcode Fuzzy Hash: dbabca0daaad52e6d2fee9b053951e65599bec3c22e1c459a219101abfb20a77
        • Instruction Fuzzy Hash: A5029173E29B4685EE128B35D5503B467A0BF95794F284335C94E933A0DF3EE48A824E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 21cb066ba30a2d58ebcf8ae559d9ba3061f44fe4dc0b64825ad821ff6f3f83a3
        • Instruction ID: 4193b4e3dac9e8cd549f4d6682b4cd5fd82b4c684c9dff13c6d691bd73043183
        • Opcode Fuzzy Hash: 21cb066ba30a2d58ebcf8ae559d9ba3061f44fe4dc0b64825ad821ff6f3f83a3
        • Instruction Fuzzy Hash: 49D1AAB3B14B8983DB598F25E084BA837A9E758BC8F444135DE0E4BB58CF39D648C758
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 99a4a12b91c2d5bd1856623fb6e16607a499bd9f8d9650a84f116bfe847d2354
        • Instruction ID: c09f639bf585f608a37dc9af20a41ba54d408931a432550489f5e1f9453189bc
        • Opcode Fuzzy Hash: 99a4a12b91c2d5bd1856623fb6e16607a499bd9f8d9650a84f116bfe847d2354
        • Instruction Fuzzy Hash: 6B61E112E2950795F909FF36AC112F8A2311F9A790F582530DD5ED77A3ED2EE048870E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4d6254c0ef687fac40c48f3d506a17342e23e87eff8218f83829c6cce0c6783e
        • Instruction ID: 4f3a6940bbbde789adbc4f1f5ed0fddc76d2ac3f75995f83aed325d878a4294c
        • Opcode Fuzzy Hash: 4d6254c0ef687fac40c48f3d506a17342e23e87eff8218f83829c6cce0c6783e
        • Instruction Fuzzy Hash: 1BC17933A28A4681EA008B75A8507B877A4FB957E0F044736C96DC37A1DF3EE456D34E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 28436a9c3417000466a2d9979135604bb1afaa64b481e814e6aa6ec24cae149b
        • Instruction ID: 0045e517c6b6b0c74c2d17032e34cdde8e7873a7e042b1c3ae18b6b017e7599a
        • Opcode Fuzzy Hash: 28436a9c3417000466a2d9979135604bb1afaa64b481e814e6aa6ec24cae149b
        • Instruction Fuzzy Hash: 39C15933A28B86C1EA018B65E8103A877A5FF44BE4B544336C96D877A0DF3EE455D34E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 86c9ebb636796ca0e2a1abc168f63624881ec9cfa17a1a52ac6cfbaa34e87d82
        • Instruction ID: 80021dc3a81b29a56992f53591bf5421d90b83c40dd2f48121fe6410796c6177
        • Opcode Fuzzy Hash: 86c9ebb636796ca0e2a1abc168f63624881ec9cfa17a1a52ac6cfbaa34e87d82
        • Instruction Fuzzy Hash: 3D91DBB3A10B5587EB18CF29D84126833A1F754BA8F105339DE6953B98DF3DD825CB48
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d0bef39161097e9df54091f6f8947ac5f1bb2ebaed7a10930231bbe4d97c59e0
        • Instruction ID: ba450211fa865216bbce32e17a84061c659ecb5d058be2f838303728b7e11075
        • Opcode Fuzzy Hash: d0bef39161097e9df54091f6f8947ac5f1bb2ebaed7a10930231bbe4d97c59e0
        • Instruction Fuzzy Hash: CE41EF63A095529AE605AF32ED407FD6611AF88FC0F488131ED0DC77A6ED2EE505834E
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c4cfc7e4d115ce1370a28ac6abb2cf91c2911c6ad5a29bc3d3fae3187189239e
        • Instruction ID: 58e5b619dd5a8fbfa3a1b6f8e559bb5d0c2922a5c2260494d2edcebd335726ce
        • Opcode Fuzzy Hash: c4cfc7e4d115ce1370a28ac6abb2cf91c2911c6ad5a29bc3d3fae3187189239e
        • Instruction Fuzzy Hash: 44414963F2CB0E51E9068B3765853745182AF5B3D0E28C732D82DA77D5EF2EB894920D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ee72cb688372a8b7ca6c53026427fe1cb6e98e11cf675aa8f3c1fed9b58c5e49
        • Instruction ID: 963eae9998d6caaee16545a804be2bf192ca9031c84cb64999128dcab48af92c
        • Opcode Fuzzy Hash: ee72cb688372a8b7ca6c53026427fe1cb6e98e11cf675aa8f3c1fed9b58c5e49
        • Instruction Fuzzy Hash: B1412522F16B4A41EA15877A5141BB95252AFD97C4F0CC732D90FA77A0EF3EF486820D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7533faf894bf0ca9caf5f1480e5f2de4d9b878ab499b8342825ab4e25c589ece
        • Instruction ID: 4e2853df459f85aa14976e3ba35bb735f1f7afadbef0f440c953c1538ac330d3
        • Opcode Fuzzy Hash: 7533faf894bf0ca9caf5f1480e5f2de4d9b878ab499b8342825ab4e25c589ece
        • Instruction Fuzzy Hash: 2D31F933F0954582EB6D9F36D4811BCA351EB45BD4B489231CE0D833A4DE2EEC9A874D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 58f6a76dfd64ef7b78e5c6641dc319f4b652810589be1d7a6d8d44123e559c2a
        • Instruction ID: dbd4a54d596fdecf58277c0592e0b612f496a67d94244432c9dca40418bc8d21
        • Opcode Fuzzy Hash: 58f6a76dfd64ef7b78e5c6641dc319f4b652810589be1d7a6d8d44123e559c2a
        • Instruction Fuzzy Hash: 6A21FC23F2834286FBB49B7AA29277E1351EB897C0F486231DE5C43A46DD2FD499470D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ExceptionFailFastRaise$Sleep
        • String ID:
        • API String ID: 3706814929-0
        • Opcode ID: b4f4eecb476bf04b12e31564723069907bbc9b466724c713cfc222d08a9c6718
        • Instruction ID: 8b1fdff716e7f9ec5d92bbdb5df7c1c7d19f422623ce04c07d495db8a74db39a
        • Opcode Fuzzy Hash: b4f4eecb476bf04b12e31564723069907bbc9b466724c713cfc222d08a9c6718
        • Instruction Fuzzy Hash: BC21F223B2858642FB249E6AE450FBAA215EBC4790F404130EE4E83AA4DD3ED008C70D
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1d970be861cd335eefdf12fe82d3e44501331a57d5991168e1a8962bd367bcf6
        • Instruction ID: 80d33f34c5722b70a5899966c884795db58230ea26ce4a3f367269df60b42be8
        • Opcode Fuzzy Hash: 1d970be861cd335eefdf12fe82d3e44501331a57d5991168e1a8962bd367bcf6
        • Instruction Fuzzy Hash: D1F08C12E2940791E905BF36E8022F4A2211F9A340F582530DC1EE7A93BE2EE418430E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ConditionMaskThread$AddressProc$ContextCurrentErrorInfoLastLibraryLoadProcessResumeSuspendVerifyVersion
        • String ID: IsWow64Process2$QueueUserAPC2$kernel32
        • API String ID: 2652322181-269241671
        • Opcode ID: 2ed5142675b828450414f6af03e9e150d3f22da0891d8269898bcd82b2a367be
        • Instruction ID: 669eb99c4f33d10213cae818e0fb31615d12b78db042c11e1acde7a649d9aeb0
        • Opcode Fuzzy Hash: 2ed5142675b828450414f6af03e9e150d3f22da0891d8269898bcd82b2a367be
        • Instruction Fuzzy Hash: D9517D32A0864281EA65DB31E9447B923A1EF85BA0F001335D99DC77A4DF3EE40A875E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ConditionMaskThread$AddressProc$ContextCurrentErrorInfoLastLibraryLoadProcessResumeSuspendVerifyVersion
        • String ID: IsWow64Process2$QueueUserAPC2$kernel32
        • API String ID: 2652322181-269241671
        • Opcode ID: 4825748d57e2d133e0b0926e79e8171601229c5e1e52b9d54749e5c96503095b
        • Instruction ID: 77348211aed2961a3791a8e57bfbc212f5ca688c6e61c46b78f85378f7bab7cc
        • Opcode Fuzzy Hash: 4825748d57e2d133e0b0926e79e8171601229c5e1e52b9d54749e5c96503095b
        • Instruction Fuzzy Hash: 8A518E32A1874281EA65DB31E9547B923A1FF89BD0F001235D98DC77A4DF3EE40A875E
        APIs
        • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2DC0E
        • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2DC36
        • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2DC56
        • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2DC76
        • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2DC96
        • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2DCBA
        • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2DCDE
        • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2DD02
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: strcmp
        • String ID: GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent
        • API String ID: 1004003707-945519297
        • Opcode ID: a2420435b7c8d9abb28f4f8f1ce3c06c939d7a2a25c3777b265420f1345e2620
        • Instruction ID: 5577067646e7675a5a3a6b0f9dacd1d80673fa5af5967a92ab8ddd3dde418be8
        • Opcode Fuzzy Hash: a2420435b7c8d9abb28f4f8f1ce3c06c939d7a2a25c3777b265420f1345e2620
        • Instruction Fuzzy Hash: 72418172E0CA4680F611AB3695043B41291AF457F4F440331DD3CDB6E9EF6EE88A934E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ContextInitialize$AddressEnabledErrorFeaturesHandleLastModuleProcState
        • String ID: InitializeContext2$kernel32.dll
        • API String ID: 4102459504-3117029998
        • Opcode ID: 4faa34e522b81a6922513b62757b9b2305a4d9aa7d62287a7091f890ca87deb6
        • Instruction ID: a5c3827b9c221da4bbbefa39460144c65416e6471b0ac0c84555cb5a01202d4b
        • Opcode Fuzzy Hash: 4faa34e522b81a6922513b62757b9b2305a4d9aa7d62287a7091f890ca87deb6
        • Instruction Fuzzy Hash: E2316D33A19B5781EA10ABB5A4003B96390BF847D0F480535ED4D837A4DF7EE84AD75E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: Current$Thread$DuplicateExceptionFailFastHandleProcessQueryRaiseVirtual
        • String ID:
        • API String ID: 510365852-3916222277
        • Opcode ID: e3e0a65bc4f973e40a7d5c75bb7f7f943cf2642b959c91c2dbab2de6d3c60d57
        • Instruction ID: 36248072b823b25754be1a6ba88ff5e733e88c65733bd61747ad61703c2c66b8
        • Opcode Fuzzy Hash: e3e0a65bc4f973e40a7d5c75bb7f7f943cf2642b959c91c2dbab2de6d3c60d57
        • Instruction Fuzzy Hash: 6F118E73A08B818AD760EF25A4402DAB350FB457B4F140335E6BD4B7D6CF39D5468709
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID:
        • API String ID: 3168844106-0
        • Opcode ID: 1666322e2a904ac0cf5b3a234637cb36e490dfc74a66e8185ec8efb97d466e7c
        • Instruction ID: 078aeb85740848e8442c3b514a11de6f872bc1114d66b24af7141126dc6f41b3
        • Opcode Fuzzy Hash: 1666322e2a904ac0cf5b3a234637cb36e490dfc74a66e8185ec8efb97d466e7c
        • Instruction Fuzzy Hash: FE615933A19B4684EA51AB25E8403F563A0FB447D4F540336D98C83765DF3FE849938E
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID:
        • API String ID: 3168844106-0
        • Opcode ID: b21c72c450b463f4920cee275832f193dea19a1ca35f9c4e2b50207979d5093b
        • Instruction ID: 0f5f68a86784d276d9cd3ed3cb7988764f908ed69154d4d56ab79a31fd04c724
        • Opcode Fuzzy Hash: b21c72c450b463f4920cee275832f193dea19a1ca35f9c4e2b50207979d5093b
        • Instruction Fuzzy Hash: 26516933919B8684EA61AB25E8403F573A4FF95384F440336D98C83A65EF3FE449974E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ExceptionFailFastRaise
        • String ID: Process is terminating due to StackOverflowException.
        • API String ID: 2546344036-2200901744
        • Opcode ID: edcb76423634533c14701209537ab2eaed2715ea9f1ac3b1dd4543dc0ac9788a
        • Instruction ID: e791fdd0134a2565b114bc301ea2c9720d8f619ea7d43a008aa2d3311e63299a
        • Opcode Fuzzy Hash: edcb76423634533c14701209537ab2eaed2715ea9f1ac3b1dd4543dc0ac9788a
        • Instruction Fuzzy Hash: 6C518333B1865281EE548B35E5403B823A1EB48BA4F444636DA1D877A5DE3FE899930E
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: SwitchThread
        • String ID:
        • API String ID: 115865932-0
        • Opcode ID: 95544bbce4b90e12acf5c392e48b6c2ca22bac221c7c535adcad6349c9bd3327
        • Instruction ID: 233c30ab1abc20fdb7db5cf472d5eeecaf4766a96afad62abab080f2130fe37f
        • Opcode Fuzzy Hash: 95544bbce4b90e12acf5c392e48b6c2ca22bac221c7c535adcad6349c9bd3327
        • Instruction Fuzzy Hash: 4D41B633B2964A85EF508E36D14037D72A0EB01BD4F18833AC65EC6785DE3EE445A75E
        APIs
        • WaitForMultipleObjectsEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6E8D23541), ref: 00007FF6E8D2CD44
        • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6E8D23541), ref: 00007FF6E8D2CD4E
        • CoWaitForMultipleHandles.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6E8D23541), ref: 00007FF6E8D2CD6D
        • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6E8D23541), ref: 00007FF6E8D2CD81
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ErrorLastMultipleWait$HandlesObjects
        • String ID:
        • API String ID: 2817213684-0
        • Opcode ID: 71cbba1b383cf0b7fb516053fcd2ddd0c29d4ad2df29a1dc53a75a309a826a29
        • Instruction ID: 02a0fc063b452b33f994001447404d39eb89fd0b88096b44bf47597b6f3ce8e0
        • Opcode Fuzzy Hash: 71cbba1b383cf0b7fb516053fcd2ddd0c29d4ad2df29a1dc53a75a309a826a29
        • Instruction Fuzzy Hash: 8411513660C65582D7348B26B45022AB761FB48791F540335FACD87B99CF3DD8048B4D
        APIs
        • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D8C243), ref: 00007FF6E8D8CF80
        • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6E8D8C243), ref: 00007FF6E8D8CFC1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: ExceptionFileHeaderRaise
        • String ID: csm
        • API String ID: 2573137834-1018135373
        • Opcode ID: 2158b8275b8e927ea860eb8b48a04596ff7d9b9df4afa64fc7c7d762c6f39301
        • Instruction ID: eb2bab39af74c8a9f3cbdb052d7749b30aeea4303649ae8fa3cc80111e13f9e5
        • Opcode Fuzzy Hash: 2158b8275b8e927ea860eb8b48a04596ff7d9b9df4afa64fc7c7d762c6f39301
        • Instruction Fuzzy Hash: 33114932619B4182EB608B25E400269B7E4FB88B94F588230EACD47B58DF3DC5558B08
        APIs
        • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,HeapVerify,00007FF6E8D2DD43,?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2E51B
        • strtoull.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,HeapVerify,00007FF6E8D2DD43,?,?,?,00007FF6E8D34107,?,?,?,?,00007FF6E8D2D115), ref: 00007FF6E8D2E558
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: _stricmpstrtoull
        • String ID: HeapVerify
        • API String ID: 4031153986-2674988305
        • Opcode ID: 7c2d8afe691a5ee2b53f1849f6005c7252510a015ecc9786c3c7096a8c5378b9
        • Instruction ID: 4394e6ee078a6b11918084f87e06b9ad3d61e215b908593740f9a6917215fde1
        • Opcode Fuzzy Hash: 7c2d8afe691a5ee2b53f1849f6005c7252510a015ecc9786c3c7096a8c5378b9
        • Instruction Fuzzy Hash: 9A01D272A18A4286E7049F21F880169B3A0FB44780F689131DA9D83B89DE3DE485870C
        APIs
        • EnterCriticalSection.KERNEL32(?,?,00000080,00007FF6E8D45BEF,?,?,?,00007FF6E8D533BB), ref: 00007FF6E8D45ABD
        • LeaveCriticalSection.KERNEL32(?,?,00000080,00007FF6E8D45BEF,?,?,?,00007FF6E8D533BB), ref: 00007FF6E8D45B12
        • EnterCriticalSection.KERNEL32(?,?,00000080,00007FF6E8D45BEF,?,?,?,00007FF6E8D533BB), ref: 00007FF6E8D45B2F
        • LeaveCriticalSection.KERNEL32(?,?,00000080,00007FF6E8D45BEF,?,?,?,00007FF6E8D533BB), ref: 00007FF6E8D45B4C
        Memory Dump Source
        • Source File: 00000000.00000002.2171199960.00007FF6E8D21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E8D20000, based on PE: true
        • Associated: 00000000.00000002.2171183257.00007FF6E8D20000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171313837.00007FF6E8E6B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171354180.00007FF6E8EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F61000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171416662.00007FF6E8F6D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2171469647.00007FF6E8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6e8d20000_PO454355 Pdf.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID:
        • API String ID: 3168844106-0
        • Opcode ID: a1fa865a0e94e1f8772bdde457da13c0df39fa8a2aff1e55c8e78e7da091c82e
        • Instruction ID: cb6478655d00df7888634abc1cdd5ff9718bcb1572c20d3da9a9f2f89ff4372a
        • Opcode Fuzzy Hash: a1fa865a0e94e1f8772bdde457da13c0df39fa8a2aff1e55c8e78e7da091c82e
        • Instruction Fuzzy Hash: 9A21B233E28A0681EA009F31A9503B923A4EF557E4F580335D96C83A95CF6FE55A834E