Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
getscreen-456311346-x86.exe

Overview

General Information

Sample name:getscreen-456311346-x86.exe
Analysis ID:1503284
MD5:de8e90d5c46a3380029fb62d92744f41
SHA1:e915793ce37d0875714a0dc6f20da55124bc8f80
SHA256:d46919fddb23e71c0e711edcd9fb2974328c12dd71758aeaa17de02dac73d37b
Infos:

Detection

Score:54
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:47
Range:0 - 100

Signatures

Modifies Internet Explorer zonemap settings
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: IE Change Domain Zone
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64native
  • getscreen-456311346-x86.exe (PID: 8892 cmdline: "C:\Users\user\Desktop\getscreen-456311346-x86.exe" MD5: DE8E90D5C46A3380029FB62D92744F41)
    • getscreen-456311346-x86.exe (PID: 9052 cmdline: "C:\Users\user\Desktop\getscreen-456311346-x86.exe" -gpipe \\.\pipe\PCommand97avnyqersrfjzkub -gui MD5: DE8E90D5C46A3380029FB62D92744F41)
    • getscreen-456311346-x86.exe (PID: 4524 cmdline: "C:\Users\user\Desktop\getscreen-456311346-x86.exe" -cpipe \\.\pipe\PCommand96evxxgkwekidqvpd -cmem 0000pipe0PCommand96evxxgkwekidqvpdw3wyrqdv7gow1iy -child MD5: DE8E90D5C46A3380029FB62D92744F41)
  • svchost.exe (PID: 8964 cmdline: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc MD5: F586835082F632DC8D9404D83BC16316)
  • dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe (PID: 9196 cmdline: "C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe" -elevate \\.\pipe\elevateGS512dnmybolotevdhjfjcacchgwlchvsnes MD5: DE8E90D5C46A3380029FB62D92744F41)
  • svchost.exe (PID: 3304 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon MD5: F586835082F632DC8D9404D83BC16316)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: frack113: Data: Details: 2, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\getscreen-456311346-x86.exe, ProcessId: 9052, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getscreen.me\http
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc, CommandLine: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 856, ProcessCommandLine: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc, ProcessId: 8964, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E0584E crypto_cert_get_dns_names,6_2_00E0584E
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05831 crypto_cert_free,6_2_00E05831
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05966 crypto_cert_get_public_key,6_2_00E05966
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00EE2165 freerdp_assistance_encrypt_pass_stub,6_2_00EE2165
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E0612F crypto_rsa_public_encrypt,6_2_00E0612F
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E06105 crypto_rsa_private_encrypt,6_2_00E06105
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E0590A crypto_cert_get_email,6_2_00E0590A
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05ABB crypto_cert_hash,6_2_00E05ABB
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05A61 crypto_cert_get_signature_alg,6_2_00E05A61
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05A65 crypto_cert_get_upn,6_2_00E05A65
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05B24 crypto_cert_issuer,6_2_00E05B24
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E17B24 crypto_base64_decode,6_2_00E17B24
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05B39 crypto_cert_print_info,crypto_cert_subject,crypto_cert_issuer,crypto_cert_fingerprint,6_2_00E05B39
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E17B3F crypto_base64_encode,6_2_00E17B3F
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E5E42E _DecryptMessage@16,InitOnceExecuteOnce,6_2_00E5E42E
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E5E437 _EncryptMessage@16,InitOnceExecuteOnce,6_2_00E5E437
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05DA5 crypto_cert_subject_common_name,6_2_00E05DA5
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05D82 crypto_cert_subject,6_2_00E05D82
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05D97 crypto_cert_subject_alt_name,6_2_00E05D97
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05D58 crypto_cert_read,6_2_00E05D58
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05ED1 crypto_reverse,6_2_00E05ED1
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00EE2620 freerdp_assistance_get_encrypted_pass_stub,6_2_00EE2620
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05E14 crypto_get_certificate_data,crypto_cert_fingerprint,crypto_cert_issuer,crypto_cert_subject,certificate_data_new,6_2_00E05E14
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05782 crypto_cert_fingerprint_by_hash,crypto_cert_hash,6_2_00E05782
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E0576E crypto_cert_fingerprint,crypto_cert_fingerprint_by_hash,6_2_00E0576E
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E05732 crypto_cert_dns_names_free,6_2_00E05732
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E13F1C certificate_data_new,crypto_base64_encode,crypto_base64_encode,6_2_00E13F1C
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E0584E crypto_cert_get_dns_names,8_2_00E0584E
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05831 crypto_cert_free,8_2_00E05831
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05966 crypto_cert_get_public_key,8_2_00E05966
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00EE2165 freerdp_assistance_encrypt_pass_stub,8_2_00EE2165
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E0612F crypto_rsa_public_encrypt,8_2_00E0612F
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E06105 crypto_rsa_private_encrypt,8_2_00E06105
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E0590A crypto_cert_get_email,8_2_00E0590A
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05ABB crypto_cert_hash,8_2_00E05ABB
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05A61 crypto_cert_get_signature_alg,8_2_00E05A61
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05A65 crypto_cert_get_upn,8_2_00E05A65
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05B24 crypto_cert_issuer,8_2_00E05B24
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E17B24 crypto_base64_decode,8_2_00E17B24
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05B39 crypto_cert_print_info,crypto_cert_subject,crypto_cert_issuer,crypto_cert_fingerprint,8_2_00E05B39
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E17B3F crypto_base64_encode,8_2_00E17B3F
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E5E42E _DecryptMessage@16,InitOnceExecuteOnce,8_2_00E5E42E
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E5E437 _EncryptMessage@16,InitOnceExecuteOnce,8_2_00E5E437
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05DA5 crypto_cert_subject_common_name,8_2_00E05DA5
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05D82 crypto_cert_subject,8_2_00E05D82
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05D97 crypto_cert_subject_alt_name,8_2_00E05D97
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05D58 crypto_cert_read,8_2_00E05D58
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05ED1 crypto_reverse,8_2_00E05ED1
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00EE2620 freerdp_assistance_get_encrypted_pass_stub,8_2_00EE2620
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05E14 crypto_get_certificate_data,crypto_cert_fingerprint,crypto_cert_issuer,crypto_cert_subject,certificate_data_new,8_2_00E05E14
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05782 crypto_cert_fingerprint_by_hash,crypto_cert_hash,8_2_00E05782
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E0576E crypto_cert_fingerprint,crypto_cert_fingerprint_by_hash,8_2_00E0576E
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E05732 crypto_cert_dns_names_free,8_2_00E05732
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00E13F1C certificate_data_new,crypto_base64_encode,crypto_base64_encode,8_2_00E13F1C
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5831 crypto_cert_free,10_2_00AD5831
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD584E crypto_cert_get_dns_names,10_2_00AD584E
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD612F crypto_rsa_public_encrypt,10_2_00AD612F
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD590A crypto_cert_get_email,10_2_00AD590A
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD6105 crypto_rsa_private_encrypt,10_2_00AD6105
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5966 crypto_cert_get_public_key,10_2_00AD5966
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00BB2165 freerdp_assistance_encrypt_pass_stub,10_2_00BB2165
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5ABB crypto_cert_hash,10_2_00AD5ABB
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5A65 crypto_cert_get_upn,10_2_00AD5A65
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5A61 crypto_cert_get_signature_alg,10_2_00AD5A61
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5B24 crypto_cert_issuer,10_2_00AD5B24
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AE7B24 crypto_base64_decode,10_2_00AE7B24
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AE7B3F crypto_base64_encode,10_2_00AE7B3F
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5B39 crypto_cert_print_info,crypto_cert_subject,crypto_cert_issuer,crypto_cert_fingerprint,10_2_00AD5B39
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00B2E437 _EncryptMessage@16,InitOnceExecuteOnce,10_2_00B2E437
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00B2E42E _DecryptMessage@16,InitOnceExecuteOnce,10_2_00B2E42E
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5DA5 crypto_cert_subject_common_name,10_2_00AD5DA5
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5D82 crypto_cert_subject,10_2_00AD5D82
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5D97 crypto_cert_subject_alt_name,10_2_00AD5D97
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5D58 crypto_cert_read,10_2_00AD5D58
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5ED1 crypto_reverse,10_2_00AD5ED1
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00BB2620 freerdp_assistance_get_encrypted_pass_stub,10_2_00BB2620
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5E14 crypto_get_certificate_data,crypto_cert_fingerprint,crypto_cert_issuer,crypto_cert_subject,certificate_data_new,10_2_00AD5E14
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5782 crypto_cert_fingerprint_by_hash,crypto_cert_hash,10_2_00AD5782
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD5732 crypto_cert_dns_names_free,10_2_00AD5732
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AE3F1C certificate_data_new,crypto_base64_encode,crypto_base64_encode,10_2_00AE3F1C
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00AD576E crypto_cert_fingerprint,crypto_cert_fingerprint_by_hash,10_2_00AD576E
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION getscreen-456311346-x86.exeJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION getscreen-456311346-x86.exeJump to behavior

Compliance

barindex
Source: getscreen-456311346-x86.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: getscreen-456311346-x86.exeStatic PE information: certificate valid
Source: getscreen-456311346-x86.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Project\agent-windows\console\Win32\Release\getscreen.pdb source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp
Source: Joe Sandbox ViewIP Address: 78.47.165.25 78.47.165.25
Source: Joe Sandbox ViewIP Address: 5.75.168.191 5.75.168.191
Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
Source: global trafficDNS traffic detected: DNS query: getscreen.me
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://ocsp.digicert.com0A
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://ocsp.digicert.com0C
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://ocsp.digicert.com0X
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://proxy.contoso.com:3128/
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://proxy.pcommand.com:3128
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01http://www.webrtc.org/exper
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-time
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-timeurn:3gpp:video-orientationhttp://www.we
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/color-space
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/generic-frame-descriptor-00
Source: getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/inband-cn
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/playout-delay
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/transport-wide-cc-02
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-content-type
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-frame-tracking-id
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-layers-allocation00
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-timing
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://%S/%S/agent/chat$.typeoutprocessData4Z
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://getscreen.me/agent-policy
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://getscreen.me/agent-policyhttps://%s/docs/agenthttps://%s/?utm_source=agent&utm_campaign=link
Source: getscreen-456311346-x86.exe, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: unknownNetwork traffic detected: HTTP traffic on port 50693 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51422 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52633 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50452 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51663 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51548 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50578 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50440 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53603 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51892 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52518 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51410 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50325 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51524 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52976 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52645 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50464 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50108 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52404 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51319 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50439 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52608 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51651 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50337 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53958 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52506 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51320 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50566 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51687 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52416 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53627 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53934 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52964 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51512 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50591 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50301 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52302 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50656 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50247 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51561 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 54609 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51446 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51626 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52898 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53946 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50313 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51434 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52886 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52555 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51103 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50259 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53615 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51307 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51500 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51573 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52952 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52621 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51638 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52428 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50644 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53411 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52516
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52517
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53847
Source: unknownNetwork traffic detected: HTTP traffic on port 50386 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51115 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52514
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52515
Source: unknownNetwork traffic detected: HTTP traffic on port 52567 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53845
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52518
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52519
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53849
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53840
Source: unknownNetwork traffic detected: HTTP traffic on port 50632 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52512
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53844
Source: unknownNetwork traffic detected: HTTP traffic on port 50873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52513
Source: unknownNetwork traffic detected: HTTP traffic on port 53537 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52510
Source: unknownNetwork traffic detected: HTTP traffic on port 53778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53842
Source: unknownNetwork traffic detected: HTTP traffic on port 52326 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52511
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53841
Source: unknownNetwork traffic detected: HTTP traffic on port 50758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50999 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52527
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53859
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52528
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53858
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52525
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53857
Source: unknownNetwork traffic detected: HTTP traffic on port 50505 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52526
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53856
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52529
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53851
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52520
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53850
Source: unknownNetwork traffic detected: HTTP traffic on port 50987 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52453 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51957 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52523
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53855
Source: unknownNetwork traffic detected: HTTP traffic on port 51001 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52524
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53854
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52521
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52522
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53852
Source: unknownNetwork traffic detected: HTTP traffic on port 53910 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53881 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53652 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52200 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52338 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50885 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51207
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52538
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51208
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52539
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53869
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51205
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52536
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51206
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52537
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53867
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51209
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52530
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51200
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52531
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53861
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53860
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51203
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52534
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53866
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51204
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52535
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53865
Source: unknownNetwork traffic detected: HTTP traffic on port 50374 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51201
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52532
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53864
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51202
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52533
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53863
Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50861 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51254 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50620 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52314 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53525 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51218
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52549
Source: unknownNetwork traffic detected: HTTP traffic on port 53922 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51219
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51216
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52547
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51217
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52548
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53878
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51210
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52541
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53873
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51211
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52542
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53872
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53871
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52540
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53870
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51214
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52545
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53877
Source: unknownNetwork traffic detected: HTTP traffic on port 50897 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51215
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52546
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53876
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51212
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52543
Source: unknownNetwork traffic detected: HTTP traffic on port 53664 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53875
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51213
Source: unknownNetwork traffic detected: HTTP traffic on port 52212 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52544
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53874
Source: unknownNetwork traffic detected: HTTP traffic on port 52579 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53880
Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53893 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52441 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51945 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51127 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53804
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53803
Source: unknownNetwork traffic detected: HTTP traffic on port 51140 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53802
Source: unknownNetwork traffic detected: HTTP traffic on port 52592 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53801
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53805
Source: unknownNetwork traffic detected: HTTP traffic on port 51266 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51933 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53800
Source: unknownNetwork traffic detected: HTTP traffic on port 51025 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52477 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50350 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53809
Source: unknownNetwork traffic detected: HTTP traffic on port 50607 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50362 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53814
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53813
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53819
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53818
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53811
Source: unknownNetwork traffic detected: HTTP traffic on port 51806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53810
Source: unknownNetwork traffic detected: HTTP traffic on port 51139 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52849 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52580 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53501 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50476 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53639 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53826
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53824
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53823
Source: unknownNetwork traffic detected: HTTP traffic on port 51790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53829
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53827
Source: unknownNetwork traffic detected: HTTP traffic on port 53640 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50619 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53822
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53821
Source: unknownNetwork traffic detected: HTTP traffic on port 51675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53820
Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51409 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51921 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50349 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52465 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51013 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52505
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53837
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52506
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53836
Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52503
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53835
Source: unknownNetwork traffic detected: HTTP traffic on port 54430 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52504
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53834
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52509
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52507
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52508
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53838
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52501
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53833
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52502
Source: unknownNetwork traffic detected: HTTP traffic on port 53513 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53832
Source: unknownNetwork traffic detected: HTTP traffic on port 50488 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53831
Source: unknownNetwork traffic detected: HTTP traffic on port 50746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52500
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53830
Source: unknownNetwork traffic detected: HTTP traffic on port 53909 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 54303 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52988 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51278 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51536 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51144
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52475
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51145
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52476
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51142
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52473
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51143
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52474
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51148
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52479
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51149
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51146
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52477
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51147
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52478
Source: unknownNetwork traffic detected: HTTP traffic on port 54201 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51176 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51151
Source: unknownNetwork traffic detected: HTTP traffic on port 52146 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52482
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51152
Source: unknownNetwork traffic detected: HTTP traffic on port 52387 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52483
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52480
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51150
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52481
Source: unknownNetwork traffic detected: HTTP traffic on port 53598 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53357 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 54568 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51164 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53116 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 54178 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52375 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53345 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51155
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52486
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51156
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52487
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51153
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52484
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51154
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52485
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51159
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51157
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52488
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51158
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52489
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52490
Source: unknownNetwork traffic detected: HTTP traffic on port 54442 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51162
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52493
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51163
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52494
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51160
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52491
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52492
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51161
Source: unknownNetwork traffic detected: HTTP traffic on port 50812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52158 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51166
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52497
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51167
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52498
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51164
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52495
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52496
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51165
Source: unknownNetwork traffic detected: HTTP traffic on port 53369 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 51152 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51168
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52499
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51169
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51170
Source: unknownNetwork traffic detected: HTTP traffic on port 54191 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51173
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51174
Source: unknownNetwork traffic detected: HTTP traffic on port 53196 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51171
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51172
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51177
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51178
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51175
Source: unknownNetwork traffic detected: HTTP traffic on port 53104 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51176
Source: unknownNetwork traffic detected: HTTP traffic on port 54556 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51179
Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51180
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51181
Source: unknownNetwork traffic detected: HTTP traffic on port 54225 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51184
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51185
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51182
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51183
Source: unknownNetwork traffic detected: HTTP traffic on port 53333 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52110 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53562 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 54454 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53002 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51108
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52439
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51109
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51106
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52437
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51107
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52438
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53768
Source: unknownNetwork traffic detected: HTTP traffic on port 54395 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 54532 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51100
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52431
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51101
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52432
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52430
Source: unknownNetwork traffic detected: HTTP traffic on port 50055 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53760
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51104
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52435
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52436
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51105
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51102
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52433
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51103
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52434
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53770
Source: unknownNetwork traffic detected: HTTP traffic on port 50848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51119
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51117
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52448
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51118
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52449
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53779
Source: unknownNetwork traffic detected: HTTP traffic on port 52109 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51111
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52442
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51112
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52440
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51110
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52441
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51115
Source: unknownNetwork traffic detected: HTTP traffic on port 52087 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52446
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51116
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52447
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51113
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52444
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53776
Source: unknownNetwork traffic detected: HTTP traffic on port 54466 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51114
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52445
Source: unknownNetwork traffic detected: HTTP traffic on port 53550 -> 443
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_0083B0806_2_0083B080
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_008201A06_2_008201A0
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_008689A06_2_008689A0
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_008573006_2_00857300
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_0085A30D6_2_0085A30D
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_008566576_2_00856657
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_008197006_2_00819700
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_0083B0808_2_0083B080
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_008689A08_2_008689A0
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_0085A30D8_2_0085A30D
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_0050B08010_2_0050B080
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_005389A010_2_005389A0
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_0052A30D10_2_0052A30D
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: String function: 00B22354 appears 50 times
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: String function: 00B2E717 appears 101 times
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: String function: 00E52354 appears 104 times
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: String function: 00E5E717 appears 202 times
Source: getscreen-456311346-x86.exeStatic PE information: Resource name: AFX_DIALOG_LAYOUT type: DOS executable (COM, 0x8C-variant)
Source: getscreen-456311346-x86.exeStatic PE information: Resource name: RT_ICON type: DOS executable (COM)
Source: getscreen-456311346-x86.exeStatic PE information: Resource name: RT_DIALOG type: DOS executable (COM, 0x8C-variant)
Source: dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drStatic PE information: Resource name: AFX_DIALOG_LAYOUT type: DOS executable (COM, 0x8C-variant)
Source: dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drStatic PE information: Resource name: RT_ICON type: DOS executable (COM)
Source: dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drStatic PE information: Resource name: RT_DIALOG type: DOS executable (COM, 0x8C-variant)
Source: getscreen-456311346-x86.exe, 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-456311346-x86.exe
Source: getscreen-456311346-x86.exe, 00000006.00000000.610192932676.0000000001F43000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-456311346-x86.exe
Source: getscreen-456311346-x86.exe, 00000008.00000000.610196460940.0000000001F43000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-456311346-x86.exe
Source: getscreen-456311346-x86.exe, 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-456311346-x86.exe
Source: getscreen-456311346-x86.exe, 0000000C.00000002.610383652509.0000000001F43000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-456311346-x86.exe
Source: getscreen-456311346-x86.exe, 0000000C.00000000.610228966598.0000000001F43000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-456311346-x86.exe
Source: getscreen-456311346-x86.exeBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-456311346-x86.exe
Source: getscreen-456311346-x86.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal54.phis.evad.winEXE@9/5@7/2
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeFile created: C:\Users\user\AppData\Local\Getscreen.meJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeMutant created: \Sessions\1\BaseNamedObjects\Global\PCommandMutextTurbo96phqghum
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name, NumberOfCores, NumberOfLogicalProcessors, MaxClockSpeed, Caption FROM Win32_Processor
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeFile read: C:\Users\user\Desktop\getscreen-456311346-x86.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\getscreen-456311346-x86.exe "C:\Users\user\Desktop\getscreen-456311346-x86.exe"
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeProcess created: C:\Users\user\Desktop\getscreen-456311346-x86.exe "C:\Users\user\Desktop\getscreen-456311346-x86.exe" -gpipe \\.\pipe\PCommand97avnyqersrfjzkub -gui
Source: unknownProcess created: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe "C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe" -elevate \\.\pipe\elevateGS512dnmybolotevdhjfjcacchgwlchvsnes
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeProcess created: C:\Users\user\Desktop\getscreen-456311346-x86.exe "C:\Users\user\Desktop\getscreen-456311346-x86.exe" -cpipe \\.\pipe\PCommand96evxxgkwekidqvpd -cmem 0000pipe0PCommand96evxxgkwekidqvpdw3wyrqdv7gow1iy -child
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeProcess created: C:\Users\user\Desktop\getscreen-456311346-x86.exe "C:\Users\user\Desktop\getscreen-456311346-x86.exe" -gpipe \\.\pipe\PCommand97avnyqersrfjzkub -guiJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\Desktop\getscreen-456311346-x86.exe "C:\Users\user\Desktop\getscreen-456311346-x86.exe" -cpipe \\.\pipe\PCommand96evxxgkwekidqvpd -cmem 0000pipe0PCommand96evxxgkwekidqvpdw3wyrqdv7gow1iy -childJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: sas.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: dsparse.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: avrt.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: mfwmaaec.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: mfperfhelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: audioses.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: avrt.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{304CE942-6E39-40D8-943A-B913C40C9CD4}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: getscreen-456311346-x86.exeStatic PE information: certificate valid
Source: getscreen-456311346-x86.exeStatic file information: File size 3654448 > 1048576
Source: getscreen-456311346-x86.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x374e00
Source: getscreen-456311346-x86.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Project\agent-windows\console\Win32\Release\getscreen.pdb source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_01F429E0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,6_2_01F429E0
Source: dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe.6.drStatic PE information: real checksum: 0x38a69d should be: 0x38379c
Source: getscreen-456311346-x86.exeStatic PE information: real checksum: 0x38a69d should be: 0x38379c
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeFile created: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeJump to dropped file
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeFile created: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeJump to dropped file
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E67449 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_00E67449
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT BankLabel, DeviceLocator, DataWidth, Manufacturer, PartNumber, SerialNumber, Capacity FROM Win32_PhysicalMemory
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption, Size FROM Win32_DiskDrive
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name, Manufacturer, MACAddress, Speed, InterfaceIndex, Index, GUID FROM Win32_NetworkAdapter WHERE PhysicalAdapter=TRUE
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT DHCPServer, DNSServerSearchOrder, IPAddress FROM Win32_NetworkAdapterConfiguration WHERE InterfaceIndex = 1
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT DHCPServer, DNSServerSearchOrder, IPAddress FROM Win32_NetworkAdapterConfiguration WHERE InterfaceIndex = 2
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT DHCPServer, DNSServerSearchOrder, IPAddress FROM Win32_NetworkAdapterConfiguration WHERE InterfaceIndex = 11
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT IPAddress FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = &apos;True&apos;
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT BankLabel, DeviceLocator, DataWidth, Manufacturer, PartNumber, SerialNumber, Capacity FROM Win32_PhysicalMemory
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption, VolumeName, FileSystem, Size, FreeSpace FROM Win32_LogicalDisk
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption FROM Win32_SoundDevice
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWindow / User API: threadDelayed 1182Jump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWindow / User API: threadDelayed 9957Jump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWindow / User API: threadDelayed 959Jump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeAPI coverage: 2.6 %
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeAPI coverage: 1.2 %
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeAPI coverage: 1.5 %
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exe TID: 2976Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exe TID: 4240Thread sleep count: 959 > 30Jump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT BIOSVersion, Name, ReleaseDate FROM Win32_BIOS
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT BIOSVersion, Name, ReleaseDate FROM Win32_BIOS
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model, Name, Domain, Workgroup FROM Win32_ComputerSystem
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model, Name, Domain, Workgroup FROM Win32_ComputerSystem
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name, NumberOfCores, NumberOfLogicalProcessors, MaxClockSpeed, Caption FROM Win32_Processor
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeLast function: Thread delayed
Source: getscreen-456311346-x86.exe, 00000008.00000002.612685052015.0000000002070000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllx
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Hyper-V console (use port 2179, disable negotiation)
Source: getscreen-456311346-x86.exe, 0000000C.00000002.610381098872.00000000004A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9
Source: getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VMnet
Source: getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: WebRTC-AllowMACBasedIPv6WebRTC-BindUsingInterfaceNameVMnetWebRTC-UseDifferentiatedCellularCostsWebRTC-AddNetworkCostToVpnNet[:id=RT
Source: dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610216447145.0000000002151000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!
Source: getscreen-456311346-x86.exe, 00000006.00000002.612686835927.00000000025D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: aWebRTC-AllowMACBasedIPv6WebRTC-BindUsingInterfaceNameVMnetWebRTC-UseDifferentiatedCellularCostsWebRTC-AddNetworkCostToVpnNet[:id=RTQ
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeAPI call chain: ExitProcess graph end nodegraph_6-14226
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeAPI call chain: ExitProcess graph end nodegraph_8-13046
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeAPI call chain: ExitProcess graph end nodegraph_10-12897
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00EB61B5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00EB61B5
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_01F429E0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,6_2_01F429E0
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00EB61B5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00EB61B5
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00EAFCA9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00EAFCA9
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 8_2_00EAFCA9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00EAFCA9
Source: C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exeCode function: 10_2_00B7FCA9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00B7FCA9
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E073E8 freerdp_input_send_mouse_event,6_2_00E073E8
Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\Desktop\getscreen-456311346-x86.exe "C:\Users\user\Desktop\getscreen-456311346-x86.exe" -cpipe \\.\pipe\PCommand96evxxgkwekidqvpd -cmem 0000pipe0PCommand96evxxgkwekidqvpdw3wyrqdv7gow1iy -childJump to behavior
Source: getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: loselink.button.copymain.isntall.howconnection.session.titleconnection.menu.copyconnection.menu.generatelogin.password.titlelogin.password.ennterlogin.active.help.1login.link.dashboard.1login.link.dashboard.2login.link.registerlogin.link.restorelogin.link.help.1login.link.help.2login.active.device.titlelogin.active.contactlogin.menu.dashboardlogin.menu.logoutsettings.common.titlesettings.common.agentsettings.common.languagesettings.common.startupsettings.common.onetimesettings.common.adminsettings.permission.titlesettings.permission.controlsettings.permission.audiosettings.permission.micsettings.permission.filesettings.permission.lock_inputsettings.permission.confirmsettings.proxy.buttoninvite.disableinvite.button.agreecall.income.textcall.income.acceptcall.income.rejectcall.out.textcall.out.cancelcall.connect.textcall.connect.closecall.active.closecall.rejecet.textcall.rejecet.againcall.rejecet.closecall.finish.textcall.finish.closeturbo.button.hideturbo.button.endturbo.button.proxyturbo.button.closeturbo.button.callturbo.button.chatturbo.confirm.closeturbo.confirm.close.yesturbo.confirm.close.noturbo.menu.exitturbo.menu.chatturbo.menu.showsettings.proxy.usesettings.proxy.serversettings.proxy.loginsettings.proxy.passwordsettings.proxy.applysettings.proxy.cancelconnection.confirm.acceptinstall.turbo.line2install.turbo.confirmconnection.link.titleconnection.link.text.4connection.link.title.2connection.link.title.3connection.link.getlogin.active.help.title.headlogin.active.help.title.2login.active.help.title.3connection.menu.clipboardconnection.menu.diactivateconnection.menu.disableShell_traywnd z
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_008689A0 cpuid 6_2_008689A0
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeCode function: 6_2_00E1E4DD rfx_context_new,GetVersionExA,GetNativeSystemInfo,RegOpenKeyExA,primitives_get,CreateThreadpool,rfx_context_set_pixel_format,6_2_00E1E4DD

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getscreen.me httpJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getscreen.me httpsJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\EscDomains\getscreen.me httpJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\EscDomains\getscreen.me httpsJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATIONJump to behavior
Source: C:\Users\user\Desktop\getscreen-456311346-x86.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATIONJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts631
Windows Management Instrumentation
1
Scripting
12
Process Injection
1
Masquerading
OS Credential Dumping731
Security Software Discovery
Remote Services1
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory53
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Browser Session Hijacking
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)53
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Modify Registry
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
Process Injection
LSA Secrets133
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Obfuscated Files or Information
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Software Packing
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
DLL Side-Loading
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1503284 Sample: getscreen-456311346-x86.exe Startdate: 03/09/2024 Architecture: WINDOWS Score: 54 26 getscreen.me 2->26 6 getscreen-456311346-x86.exe 139 2->6         started        11 dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe 6 2->11         started        13 svchost.exe 2->13         started        15 svchost.exe 2->15         started        process3 dnsIp4 28 getscreen.me 78.47.165.25, 443, 49804, 49806 HETZNER-ASDE Germany 6->28 30 5.75.168.191, 443, 49815, 49816 HETZNER-ASDE Germany 6->30 22 dnmybolotevdhjfjca...chvsnes-elevate.exe, PE32 6->22 dropped 24 dnmybolotevdhjfjca...exe:Zone.Identifier, ASCII 6->24 dropped 36 Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines) 6->36 38 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 6->38 40 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->40 44 3 other signatures 6->44 17 getscreen-456311346-x86.exe 6 3 6->17         started        20 getscreen-456311346-x86.exe 9 6->20         started        42 Query firmware table information (likely to detect VMs) 11->42 file5 signatures6 process7 signatures8 32 Query firmware table information (likely to detect VMs) 17->32 34 Modifies Internet Explorer zonemap settings 17->34

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
getscreen-456311346-x86.exe0%ReversingLabs
getscreen-456311346-x86.exe1%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe0%ReversingLabs
C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe1%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
getscreen.me0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://%S/%S/agent/chat$.typeoutprocessData4Z0%Avira URL Cloudsafe
https://getscreen.me/agent-policyhttps://%s/docs/agenthttps://%s/?utm_source=agent&utm_campaign=link0%Avira URL Cloudsafe
http://proxy.contoso.com:3128/0%Avira URL Cloudsafe
https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension0%Avira URL Cloudsafe
http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-010%Avira URL Cloudsafe
https://getscreen.me/agent-policy0%Avira URL Cloudsafe
https://getscreen.me/signal/agent0%Avira URL Cloudsafe
https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension1%VirustotalBrowse
http://proxy.pcommand.com:31280%Avira URL Cloudsafe
https://getscreen.me/agent-policyhttps://%s/docs/agenthttps://%s/?utm_source=agent&utm_campaign=link0%VirustotalBrowse
http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-010%VirustotalBrowse
http://proxy.contoso.com:3128/0%VirustotalBrowse
https://getscreen.me/agent-policy0%VirustotalBrowse
https://getscreen.me/signal/agent0%VirustotalBrowse
http://proxy.pcommand.com:31280%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
getscreen.me
78.47.165.25
truetrueunknown
NameMaliciousAntivirus DetectionReputation
https://getscreen.me/signal/agentfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://getscreen.me/agent-policyhttps://%s/docs/agenthttps://%s/?utm_source=agent&utm_campaign=linkgetscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://proxy.contoso.com:3128/getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01getscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://%S/%S/agent/chat$.typeoutprocessData4Zgetscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extensiongetscreen-456311346-x86.exe, 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.00000000007F1000.00000040.00000001.01000000.00000003.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://getscreen.me/agent-policygetscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://proxy.pcommand.com:3128getscreen-456311346-x86.exe, 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmp, getscreen-456311346-x86.exe, 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmp, dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe, 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmp, getscreen-456311346-x86.exe, 0000000C.00000002.610381381428.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
78.47.165.25
getscreen.meGermany
24940HETZNER-ASDEtrue
5.75.168.191
unknownGermany
24940HETZNER-ASDEfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1503284
Start date and time:2024-09-03 10:11:29 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 13m 39s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2021, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run name:Suspected VM Detection
Number of analysed new started processes analysed:13
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Sample name:getscreen-456311346-x86.exe
Detection:MAL
Classification:mal54.phis.evad.winEXE@9/5@7/2
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe, HxTsr.exe, RuntimeBroker.exe, backgroundTaskHost.exe
  • Excluded domains from analysis (whitelisted): www.bing.com, assets.msn.com, c.pki.goog, api.msn.com
  • Report creation exceeded maximum time and may have missing disassembly code information.
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing network information.
  • Report size getting too big, too many NtCreateKey calls found.
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtSetInformationFile calls found.
TimeTypeDescription
04:13:38API Interceptor10994204x Sleep call for process: getscreen-456311346-x86.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
78.47.165.25getscreen-941605629.exeGet hashmaliciousUnknownBrowse
    getscreen-941605629.exeGet hashmaliciousUnknownBrowse
      getscreen-156413884-x86.exeGet hashmaliciousUnknownBrowse
        getscreen-156413884-x86.exeGet hashmaliciousUnknownBrowse
          getscreen-511588515.exeGet hashmaliciousUnknownBrowse
            getscreen-973519027.exeGet hashmaliciousUnknownBrowse
              getscreen-973519027.exeGet hashmaliciousUnknownBrowse
                getscreen-959987858.exeGet hashmaliciousUnknownBrowse
                  getscreen-728974364.exeGet hashmaliciousUnknownBrowse
                    5.75.168.191getscreen-941605629-x86.exeGet hashmaliciousUnknownBrowse
                      getscreen-941605629.exeGet hashmaliciousUnknownBrowse
                        getscreen-469829524.exeGet hashmaliciousUnknownBrowse
                          getscreen-469829524.exeGet hashmaliciousUnknownBrowse
                            getscreen-156413884-x86.exeGet hashmaliciousUnknownBrowse
                              getscreen-511588515.exeGet hashmaliciousUnknownBrowse
                                getscreen-511588515.exeGet hashmaliciousUnknownBrowse
                                  getscreen-973519027.exeGet hashmaliciousUnknownBrowse
                                    getscreen-959987858.exeGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      getscreen.megetscreen-941605629.exeGet hashmaliciousUnknownBrowse
                                      • 78.47.165.25
                                      getscreen-941605629-x86.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      getscreen-941605629.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      getscreen-469829524.exeGet hashmaliciousUnknownBrowse
                                      • 51.89.95.37
                                      getscreen-469829524.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      getscreen-156413884-x86.exeGet hashmaliciousUnknownBrowse
                                      • 78.47.165.25
                                      getscreen-156413884-x86.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      getscreen-511588515.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      getscreen-511588515.exeGet hashmaliciousUnknownBrowse
                                      • 78.47.165.25
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      HETZNER-ASDEgetscreen-941605629.exeGet hashmaliciousUnknownBrowse
                                      • 78.47.165.25
                                      getscreen-941605629-x86.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      getscreen-941605629.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                      • 116.203.55.214
                                      http://instagrab000.blogspot.com/Get hashmaliciousHTMLPhisherBrowse
                                      • 116.202.167.133
                                      SecuriteInfo.com.Exploit.CVE-2017-0199.121.20522.7152.xlsxGet hashmaliciousFormBookBrowse
                                      • 88.99.66.38
                                      66d5ddcec1520_shtr.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                      • 5.75.220.8
                                      66d5ddcbb9f86_vyre.exeGet hashmaliciousLummaC, VidarBrowse
                                      • 5.75.220.8
                                      Unlock_Tool_5.0.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                      • 116.203.12.50
                                      HETZNER-ASDEgetscreen-941605629.exeGet hashmaliciousUnknownBrowse
                                      • 78.47.165.25
                                      getscreen-941605629-x86.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      getscreen-941605629.exeGet hashmaliciousUnknownBrowse
                                      • 5.75.168.191
                                      http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                      • 116.203.55.214
                                      http://instagrab000.blogspot.com/Get hashmaliciousHTMLPhisherBrowse
                                      • 116.202.167.133
                                      SecuriteInfo.com.Exploit.CVE-2017-0199.121.20522.7152.xlsxGet hashmaliciousFormBookBrowse
                                      • 88.99.66.38
                                      66d5ddcec1520_shtr.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                      • 5.75.220.8
                                      66d5ddcbb9f86_vyre.exeGet hashmaliciousLummaC, VidarBrowse
                                      • 5.75.220.8
                                      Unlock_Tool_5.0.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                      • 116.203.12.50
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                      Category:dropped
                                      Size (bytes):3654448
                                      Entropy (8bit):7.931173526975996
                                      Encrypted:false
                                      SSDEEP:98304:I2WbzRq8h0oEPel9/DLRAHyGBydPnYMJojL5NM:I2ez4o0OmyVnvKLw
                                      MD5:DE8E90D5C46A3380029FB62D92744F41
                                      SHA1:E915793CE37D0875714A0DC6F20DA55124BC8F80
                                      SHA-256:D46919FDDB23E71C0E711EDCD9FB2974328C12DD71758AEAA17DE02DAC73D37B
                                      SHA-512:A3AC78D1CB12DFC2BC680609E3755AE20F6263A8E49E983660B5C9205C822A445A4AACA3373474815D2D655E6BD4DF296B46611EB178A8E6F59C010C7EB98459
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                      Reputation:low
                                      Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.......iI/.-(AD-(AD-(ADfPBE.(AD.D)(AD.EE5(AD9WEE.(AD-(AD./ADfPFE,(AD.BE3(AD.DE](ADfPEE.(ADfPDE.(ADfPGE/(ADfP@En(AD-(@D.*AD>.HE.(AD>.AE,(AD>..D,(AD-(.D,(AD>.CE,(ADRich-(AD........................PE..L..../.f...............(.P7..P....=..)u...=..0u...@...........................u.......8...@..............................U..Pju......0u.P:............7.0/...qu. ............................+u.....<,u.............................................UPX0......=.............................UPX1.....P7...=..N7.................@....rsrc....P...0u..B...R7.............@..............................................................................................................................................................................................................................................................................................................4.22.UPX!....
                                      Process:C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):5.875
                                      Encrypted:false
                                      SSDEEP:3:BvPMB/TIOM+C8uzP:aBbRJuj
                                      MD5:24004E9FE67C6D1DDB10354AECAAD424
                                      SHA1:A7F16BCE1EB1638EEF7BBB06970545D4555BC5FF
                                      SHA-256:ED705BC6FD91AAAA3F2CD10708F2115CB634F4E5DE095E7D83BECC0FA3E96ADC
                                      SHA-512:D27C26A2BC416D290F781797784301C910D248C597A5852C8B72DA2E494D32057C2C1D48FFD93060BFE887E1B9D957953235FE88720F5E55A210BF20034CCFB4
                                      Malicious:false
                                      Preview:...J.+.q....:.O.o.....a.70.e.......,.6.<.....2.@\.%.+.#.K.jK..
                                      Process:C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):132486
                                      Entropy (8bit):5.037790408091649
                                      Encrypted:false
                                      SSDEEP:768:aX4uQZe8fel/69kBPNjkpzUxcx788t/uQf/UCEOeWtUCX2xoItvU5Bv:aX4uQZqjkpzU+40/UCEgQel
                                      MD5:82CE61EAE790E50B354F1ADD9ADF877A
                                      SHA1:096B0032674A4C624A9C5C66058848C4ED12FF8D
                                      SHA-256:E08ED358AC87C3BB33388F61AEB8417DFE3304E0E4C9BA609D73936BC7A8FD79
                                      SHA-512:DB7A947A911D1745D9C277B001EBB8BA8ED26F132028B4580C44CD5B309255CA29B7DC68E7836C961BA6777228EAF14F047F0BD9A23827D777E5A504CDF979C6
                                      Malicious:false
                                      Preview:08:13:35.315.INFO.GuiSessionList created new gui session for: 1, is active: false..08:13:35.316.INFO.Server start server run....08:13:35.317.INFO.Start Getscreen.me v 2.21.3 build 2 revision 0..08:13:35.416.INFO.GUI GUI started..08:13:35.660.INFO.CGuiSessionList m_active is null..08:13:36.499.INFO.CConfigStore Loaded config from `C:\ProgramData\Getscreen.me\folder\settings.dat`..08:13:36.500.ERROR.Service service 'GetscreenSV' not found..08:13:36.673.INFO.Service service 'GetscreenSV' installed..08:13:36.928.INFO.Service service 'GetscreenSV' start success..08:13:36.927.INFO.Service get control message 1..08:13:36.949.INFO.FrameMark hide frame..08:13:37.452.INFO.Service service 'GetscreenSV' stop [0] (0)..08:13:37.968.INFO.Service service 'GetscreenSV' removed..08:13:37.984.INFO.Child success get system token..08:13:37.985.INFO.Child start child process simply..08:13:37.987.INFO
                                      Process:C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):5.875
                                      Encrypted:false
                                      SSDEEP:3:BvPMB/TIOMpFl8g:aBbROFz
                                      MD5:99B97B85E55CC7BFB30B6A41C49DD96A
                                      SHA1:C98918FD258491EA10D500BA8E1B03A215FED05F
                                      SHA-256:81A2A163F1E09A2ABF092833F141E035B57086DBD41C6A2A4763F464743CBBE5
                                      SHA-512:8F33778DB373E8CD3E8543B2E349F8744BDB419878EA054643B75694E157B805668E3E9966C01E706236548DBFA254A89348FF3C2FBEF40428E79A80E20760F3
                                      Malicious:false
                                      Preview:...J.+.q....:.O.o.....a.70.e.......,.6.<.....2.8UO..u.C/.A{;
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                      Entropy (8bit):7.931173526975996
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.66%
                                      • UPX compressed Win32 Executable (30571/9) 0.30%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:getscreen-456311346-x86.exe
                                      File size:3'654'448 bytes
                                      MD5:de8e90d5c46a3380029fb62d92744f41
                                      SHA1:e915793ce37d0875714a0dc6f20da55124bc8f80
                                      SHA256:d46919fddb23e71c0e711edcd9fb2974328c12dd71758aeaa17de02dac73d37b
                                      SHA512:a3ac78d1cb12dfc2bc680609e3755ae20f6263a8e49e983660b5c9205c822a445a4aaca3373474815d2d655e6bd4df296b46611eb178a8e6f59c010c7eb98459
                                      SSDEEP:98304:I2WbzRq8h0oEPel9/DLRAHyGBydPnYMJojL5NM:I2ez4o0OmyVnvKLw
                                      TLSH:EB0633E1ED6939A1D33D5CB8112B56BD73FAA03658FE23C78A1D9B219E347028F52113
                                      File Content Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.......iI/.-(AD-(AD-(ADfPBE.(AD...D)(AD..EE5(AD9WEE.(AD-(AD./ADfPFE,(AD..BE3(AD..DE](ADfPEE.(ADfPDE.(ADfPGE/(ADfP@En(AD-(@D.*AD>.HE.(A
                                      Icon Hash:418c6963696c9643
                                      Entrypoint:0x1b529e0
                                      Entrypoint Section:UPX1
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x66912FD6 [Fri Jul 12 13:29:58 2024 UTC]
                                      TLS Callbacks:0x1b52bd3
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:26c6aff4250b45d1c4ee6d86013ea70c
                                      Signature Valid:true
                                      Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                      Signature Validation Error:The operation completed successfully
                                      Error Number:0
                                      Not Before, Not After
                                      • 28/05/2024 15:50:28 28/06/2026 16:36:10
                                      Subject Chain
                                      • CN=POINT B LTD, O=POINT B LTD, L=Limassol, S=Limassol, C=CY, OID.1.3.6.1.4.1.311.60.2.1.3=CY, SERIALNUMBER=HE 430957, OID.2.5.4.15=Private Organization
                                      Version:3
                                      Thumbprint MD5:9B083870477F4699693EEECABF351BF8
                                      Thumbprint SHA-1:B3C999E29AED18DEA59733F3CAA94E788B1AC3A1
                                      Thumbprint SHA-256:3E73B7C28C18DC6A03B9816F200365F1DF1FF80A7BD0D55DB920F1B24BBD74E7
                                      Serial:7AE0E9C1CFE2DCE0E21C4327
                                      Instruction
                                      pushad
                                      mov esi, 017DE000h
                                      lea edi, dword ptr [esi-013DD000h]
                                      push edi
                                      or ebp, FFFFFFFFh
                                      jmp 00007F19910238C2h
                                      nop
                                      nop
                                      nop
                                      nop
                                      nop
                                      nop
                                      mov al, byte ptr [esi]
                                      inc esi
                                      mov byte ptr [edi], al
                                      inc edi
                                      add ebx, ebx
                                      jne 00007F19910238B9h
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      jc 00007F199102389Fh
                                      mov eax, 00000001h
                                      add ebx, ebx
                                      jne 00007F19910238B9h
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      adc eax, eax
                                      add ebx, ebx
                                      jnc 00007F19910238BDh
                                      jne 00007F19910238DAh
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      jc 00007F19910238D1h
                                      dec eax
                                      add ebx, ebx
                                      jne 00007F19910238B9h
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      adc eax, eax
                                      jmp 00007F1991023886h
                                      add ebx, ebx
                                      jne 00007F19910238B9h
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      adc ecx, ecx
                                      jmp 00007F1991023904h
                                      xor ecx, ecx
                                      sub eax, 03h
                                      jc 00007F19910238C3h
                                      shl eax, 08h
                                      mov al, byte ptr [esi]
                                      inc esi
                                      xor eax, FFFFFFFFh
                                      je 00007F1991023927h
                                      sar eax, 1
                                      mov ebp, eax
                                      jmp 00007F19910238BDh
                                      add ebx, ebx
                                      jne 00007F19910238B9h
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      jc 00007F199102387Eh
                                      inc ecx
                                      add ebx, ebx
                                      jne 00007F19910238B9h
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      jc 00007F1991023870h
                                      add ebx, ebx
                                      jne 00007F19910238B9h
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      adc ecx, ecx
                                      add ebx, ebx
                                      jnc 00007F19910238A1h
                                      jne 00007F19910238BBh
                                      mov ebx, dword ptr [esi]
                                      sub esi, FFFFFFFCh
                                      adc ebx, ebx
                                      jnc 00007F1991023896h
                                      add ecx, 02h
                                      cmp ebp, FFFFFB00h
                                      adc ecx, 02h
                                      lea edx, dword ptr [eax+eax]
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x820d900x5500UPX0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1756a500x6c0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x17530000x3a50.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x3794000x2f30UPX0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x17571100x20.rsrc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x1752bf40x18UPX1
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1752c3c0xc0UPX1
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      UPX00x10000x13dd0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      UPX10x13de0000x3750000x374e00a216f7d1a8e4e14b94fdfbca52f7b652unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x17530000x50000x42005871e1397e577651929aa76b50980e16False0.4675662878787879data5.104875966236682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      AFX_DIALOG_LAYOUT0x168ca980x2ASCII text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168caa00x2Non-ISO extended-ASCII text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cb080x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x16d4db00x2ASCII text, with no line terminators5.0
                                      AFX_DIALOG_LAYOUT0x168caa80x2ISO-8859 text, with CR line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cb000x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cb100x2aDOS executable (COM, 0x8C-variant)RussianRussia1.2142857142857142
                                      AFX_DIALOG_LAYOUT0x168cb400x22dataRussianRussia1.2647058823529411
                                      AFX_DIALOG_LAYOUT0x168cb680x22dataRussianRussia1.2647058823529411
                                      AFX_DIALOG_LAYOUT0x168cb900x22dataRussianRussia1.2647058823529411
                                      AFX_DIALOG_LAYOUT0x168cbb80x22dataRussianRussia1.2647058823529411
                                      AFX_DIALOG_LAYOUT0x168cbe00x2adataRussianRussia1.2142857142857142
                                      AFX_DIALOG_LAYOUT0x168cc100x2ASCII text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc280x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc200x2dataRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc180x2ASCII textRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc300x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc380x2ASCII text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc400x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x16d4ff00x2ISO-8859 text, with no line terminatorsEnglishUnited States5.0
                                      AFX_DIALOG_LAYOUT0x168cc480x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc500x2dataRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc580x2dataRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc600x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc680x2dataRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc700x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cab00x42dataRussianRussia1.1666666666666667
                                      AFX_DIALOG_LAYOUT0x168caf80x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                                      AFX_DIALOG_LAYOUT0x168cc780x2ISO-8859 text, with no line terminators, with overstrikingRussianRussia5.0
                                      INI0x16d3a180xadataRussianRussia1.8
                                      LANG0x16ace600x1b82dataRussianRussia0.8660891792104516
                                      LANG0x16ae9e80x26fbdataRussianRussia0.950796673013328
                                      LANG0x16b10e80x1e2bdataRussianRussia0.9835556131037162
                                      LANG0x16b2f180x1e5ddataRussianRussia0.9994853981731635
                                      LANG0x16b4d780x1ca1dataRussianRussia0.9953608950743621
                                      LANG0x16b6a200x21fddataRussianRussia0.983794966095851
                                      LANG0x16b8c200x1de4dataRussianRussia0.9225039205436487
                                      LANG0x16baa080x1a50dataRussianRussia0.962143705463183
                                      LANG0x16bc4580x1d25dataRussianRussia0.9987937273823885
                                      LANG0x16be1800x1e03dataRussianRussia0.9980476376415462
                                      LANG0x16e7c380x1ddcdataEnglishUnited States0.9955520669806384
                                      OPUS0x16bff880xa5e5dataRussianRussia0.9886505451034873
                                      OPUS0x16ca5700x94a4dataRussianRussia0.978082623777988
                                      RT_ICON0x168cc800x139dataRussianRussia1.035143769968051
                                      RT_ICON0x168cdc00x1efdataRussianRussia1.0222222222222221
                                      RT_ICON0x168cfb00x225dataRussianRussia1.0200364298724955
                                      RT_ICON0x168d1d80x26bOpenPGP Public KeyRussianRussia1.0177705977382876
                                      RT_ICON0x168d4480x326dataRussianRussia1.0136476426799008
                                      RT_ICON0x168d7700x402dataRussianRussia1.010721247563353
                                      RT_ICON0x17550f00x13bPNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedRussianRussia1.034920634920635
                                      RT_ICON0x17552300x1c5PNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedRussianRussia1.0242825607064017
                                      RT_ICON0x17553fc0x1eePNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedRussianRussia1.0222672064777327
                                      RT_ICON0x17555f00x253PNG image data, 40 x 40, 8-bit/color RGBA, non-interlacedRussianRussia1.0184873949579831
                                      RT_ICON0x17558480x2e7PNG image data, 48 x 48, 8-bit/color RGBA, non-interlacedRussianRussia1.0148048452220726
                                      RT_ICON0x1755b340x3adPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedRussianRussia1.0116896918172158
                                      RT_ICON0x168ea200xacdataRussianRussia1.063953488372093
                                      RT_ICON0x168eae80x159dataRussianRussia1.0318840579710145
                                      RT_ICON0x168ec480x1e6dataRussianRussia1.022633744855967
                                      RT_ICON0x168ee300x1f6dataRussianRussia1.0219123505976095
                                      RT_ICON0x168f0280x26ddataRussianRussia1.0177133655394526
                                      RT_ICON0x168f2980x31bdataRussianRussia1.0138364779874214
                                      RT_ICON0x168f5b80x3e7dataRussianRussia1.011011011011011
                                      RT_ICON0x168fa000xddDOS executable (COM)RussianRussia1.0497737556561086
                                      RT_ICON0x168faf80x10fdataRussianRussia1.040590405904059
                                      RT_ICON0x168fc200x25a8dataRussianRussia0.999896265560166
                                      RT_ICON0x16921e00x12ddataRussianRussia1.0365448504983388
                                      RT_ICON0x16923280x106dataRussianRussia1.0419847328244274
                                      RT_ICON0x16924480x109dataRussianRussia1.0415094339622641
                                      RT_ICON0x16925700x171dataRussianRussia1.029810298102981
                                      RT_ICON0x16927000x109ddataRussianRussia1.0025864095932282
                                      RT_ICON0x16937b80xdd9dataRussianRussia1.0031029619181946
                                      RT_ICON0x16945b00xc0edataRussianRussia1.0035644847699288
                                      RT_ICON0x16951d80xb91dataRussianRussia1.0037149611617697
                                      RT_ICON0x1695d880xdd9dataRussianRussia1.0031029619181946
                                      RT_ICON0x1696b800x11cdataRussianRussia1.0387323943661972
                                      RT_ICON0x1696cb80x116dataRussianRussia1.039568345323741
                                      RT_ICON0x1696de80x1c4dataRussianRussia1.0243362831858407
                                      RT_ICON0x1696fc80x1a1dataRussianRussia1.026378896882494
                                      RT_ICON0x16971880x182dataRussianRussia1.028497409326425
                                      RT_ICON0x16973280x222dataRussianRussia1.02014652014652
                                      RT_ICON0x16975680x11fOpenPGP Secret KeyRussianRussia1.038327526132404
                                      RT_ICON0x16976a00x103dataRussianRussia1.0424710424710424
                                      RT_ICON0x16977c00x1588dataRussianRussia1.0019956458635704
                                      RT_ICON0x1698d600x580dataRussianRussia1.0078125
                                      RT_ICON0x16992f80x988dataRussianRussia1.0045081967213114
                                      RT_ICON0x1699c980x25a8dataRussianRussia0.9986514522821577
                                      RT_ICON0x169c2580x10828dataRussianRussia0.9908316573997398
                                      RT_ICON0x16d3a280x163data1.0309859154929577
                                      RT_ICON0x16d3b900x20ddata1.020952380952381
                                      RT_ICON0x16d3da00x21bdata1.0148423005565863
                                      RT_ICON0x16d3fc00x282data1.017133956386293
                                      RT_ICON0x16d42480x33cdata1.0132850241545894
                                      RT_ICON0x16d45880x413data1.0105465004793863
                                      RT_ICON0x16d4a000x152data0.9792899408284024
                                      RT_ICON0x16d4ff80x10a8dataEnglishUnited States0.9798311444652908
                                      RT_ICON0x16d60b80x988dataEnglishUnited States1.0045081967213114
                                      RT_ICON0x16d6a580x988dataEnglishUnited States0.9721311475409836
                                      RT_ICON0x16d73f80x10828dataEnglishUnited States0.9158286998698687
                                      RT_MENU0x16d4b700xf8data1.0161290322580645
                                      RT_MENU0x16acd200xd2dataRussianRussia1.0523809523809524
                                      RT_MENU0x16acdf80x66dataRussianRussia1.088235294117647
                                      RT_MENU0x16d4c680x46data1.1571428571428573
                                      RT_DIALOG0x168a0f00x490dataRussianRussia1.009417808219178
                                      RT_DIALOG0x168a5800x78dataRussianRussia1.0916666666666666
                                      RT_DIALOG0x16d4cb00x100data0.9765625
                                      RT_DIALOG0x168a5f80x1f8dataRussianRussia1.0218253968253967
                                      RT_DIALOG0x168acb00x190dataRussianRussia1.0275
                                      RT_DIALOG0x168ae400x154dataRussianRussia1.0323529411764707
                                      RT_DIALOG0x168af980xf4dataRussianRussia1.0450819672131149
                                      RT_DIALOG0x168b0900x12cdataRussianRussia1.0366666666666666
                                      RT_DIALOG0x168b1c00x110dataRussianRussia1.0404411764705883
                                      RT_DIALOG0x168b2d00x128dataRussianRussia1.037162162162162
                                      RT_DIALOG0x168b3f80x154dataRussianRussia1.0323529411764707
                                      RT_DIALOG0x168b5500x7edataRussianRussia1.0873015873015872
                                      RT_DIALOG0x168b8080x148dataRussianRussia1.0335365853658536
                                      RT_DIALOG0x168b7380xd0dataRussianRussia1.0528846153846154
                                      RT_DIALOG0x168b5d00x164dataRussianRussia1.0308988764044944
                                      RT_DIALOG0x168b9500x14cdataRussianRussia1.033132530120482
                                      RT_DIALOG0x168baa00x1f0dataRussianRussia1.0221774193548387
                                      RT_DIALOG0x168bc900x284dataRussianRussia1.0170807453416149
                                      RT_DIALOG0x16d4db80x232dataEnglishUnited States1.019572953736655
                                      RT_DIALOG0x168bf180x182dataRussianRussia1.0129533678756477
                                      RT_DIALOG0x168c0a00x68dataRussianRussia1.1057692307692308
                                      RT_DIALOG0x168c1080x1f8DOS executable (COM, 0x8C-variant)RussianRussia1.0218253968253967
                                      RT_DIALOG0x168c3000x218dataRussianRussia1.0205223880597014
                                      RT_DIALOG0x168c5180x2badataRussianRussia1.015759312320917
                                      RT_DIALOG0x168c7d80x242dataRussianRussia1.019031141868512
                                      RT_DIALOG0x168a7f00x21cdataRussianRussia1.0203703703703704
                                      RT_DIALOG0x168aa100x29adataRussianRussia1.0165165165165164
                                      RT_DIALOG0x168ca200x72OpenPGP Secret KeyRussianRussia1.0964912280701755
                                      RT_STRING0x16e9a180x38dataRussianRussia1.1964285714285714
                                      RT_GROUP_ICON0x1755ee80x5adataRussianRussia0.8
                                      RT_GROUP_ICON0x168db780x5adataRussianRussia1.1222222222222222
                                      RT_GROUP_ICON0x16d49a00x5adata1.1222222222222222
                                      RT_GROUP_ICON0x16977a80x14dataRussianRussia1.4
                                      RT_GROUP_ICON0x168ead00x14dataRussianRussia1.4
                                      RT_GROUP_ICON0x168f9a00x5adataRussianRussia1.1222222222222222
                                      RT_GROUP_ICON0x1698d480x14Non-ISO extended-ASCII text, with CR line terminatorsRussianRussia1.45
                                      RT_GROUP_ICON0x168fae00x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x168fc080x14dataRussianRussia1.2
                                      RT_GROUP_ICON0x16921c80x14Non-ISO extended-ASCII text, with LF, NEL line terminatorsRussianRussia1.4
                                      RT_GROUP_ICON0x16d4b580x14Non-ISO extended-ASCII text, with no line terminators1.4
                                      RT_GROUP_ICON0x16923100x14dataRussianRussia1.4
                                      RT_GROUP_ICON0x16924300x14locale data tableRussianRussia1.4
                                      RT_GROUP_ICON0x16925580x14International EBCDIC text, with NEL line terminatorsRussianRussia1.45
                                      RT_GROUP_ICON0x16926e80x14dataRussianRussia1.4
                                      RT_GROUP_ICON0x16937a00x14Non-ISO extended-ASCII text, with no line terminators, with overstrikingRussianRussia1.45
                                      RT_GROUP_ICON0x16945980x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x16951c00x14Non-ISO extended-ASCII text, with no line terminatorsRussianRussia1.4
                                      RT_GROUP_ICON0x1695d700x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x1696b680x14dataRussianRussia1.4
                                      RT_GROUP_ICON0x1696ca00x14dataRussianRussia1.4
                                      RT_GROUP_ICON0x1696dd00x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x1696fb00x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x16971700x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x16973100x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x16975500x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x16976880x14dataRussianRussia1.4
                                      RT_GROUP_ICON0x16992e00x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x1699c800x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x16d60a00x14dataEnglishUnited States1.45
                                      RT_GROUP_ICON0x169c2400x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x16aca800x14dataRussianRussia1.45
                                      RT_GROUP_ICON0x16d6a400x14dataEnglishUnited States1.4
                                      RT_GROUP_ICON0x16d73e00x14dataEnglishUnited States1.45
                                      RT_GROUP_ICON0x16e7c200x14dataEnglishUnited States1.45
                                      RT_VERSION0x1755f480x284dataRussianRussia0.468944099378882
                                      RT_MANIFEST0x17561d00x87fXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (2115), with CRLF line terminatorsEnglishUnited States0.31264367816091954
                                      DLLImport
                                      ADVAPI32.dllFreeSid
                                      COMCTL32.dll_TrackMouseEvent
                                      d3d11.dllD3D11CreateDevice
                                      dbghelp.dllStackWalk
                                      dxgi.dllCreateDXGIFactory1
                                      GDI32.dllLineTo
                                      gdiplus.dllGdipFree
                                      IPHLPAPI.DLLGetIfEntry2
                                      KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                                      MPR.dllWNetGetConnectionW
                                      msdmo.dllMoInitMediaType
                                      NETAPI32.dllNetUserGetInfo
                                      ntdll.dllRtlGetVersion
                                      NTDSAPI.dllDsMakeSpnW
                                      ole32.dllOleCreate
                                      OLEAUT32.dllSysFreeString
                                      POWRPROF.dllPowerGetActiveScheme
                                      RPCRT4.dllUuidEqual
                                      SAS.dllSendSAS
                                      Secur32.dllFreeCredentialsHandle
                                      SHELL32.dll
                                      SHLWAPI.dllPathFileExistsA
                                      USER32.dllGetDC
                                      USERENV.dllCreateEnvironmentBlock
                                      UxTheme.dllIsThemeActive
                                      VERSION.dllVerQueryValueW
                                      WINHTTP.dllWinHttpOpen
                                      WINMM.dllwaveInOpen
                                      WINSPOOL.DRVGetPrinterW
                                      WS2_32.dllWSASetLastError
                                      WTSAPI32.dllWTSFreeMemory
                                      Language of compilation systemCountry where language is spokenMap
                                      RussianRussia
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 3, 2024 10:13:39.888782024 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:39.888814926 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:39.889915943 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:39.889915943 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:39.889951944 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:40.339706898 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:40.340270996 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:40.340285063 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:40.342185020 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:40.342391014 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:40.343947887 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:40.344026089 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:40.344293118 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:40.344304085 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:40.396610022 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:40.813951969 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:40.814033985 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:40.814163923 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:41.220407009 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:41.220441103 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:41.220565081 CEST49804443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:41.220581055 CEST4434980478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:52.347558022 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:52.347583055 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:52.347747087 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:52.348126888 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:52.348138094 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:52.795473099 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:52.795948982 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:52.795958996 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:52.797015905 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:52.797195911 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:52.798136950 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:52.798249006 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:52.798434019 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:52.798441887 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:52.846887112 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:53.280478954 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:53.280591011 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:53.280827045 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:53.282915115 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:53.282927990 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:13:53.282968998 CEST49806443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:13:53.282975912 CEST4434980678.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:11.284460068 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:11.284482002 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:11.284717083 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:11.285173893 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:11.285186052 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:11.724064112 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:11.724519968 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:11.724530935 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:11.725497007 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:11.725788116 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:11.726555109 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:11.726655006 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:11.726907015 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:11.726917028 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:11.780157089 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:12.200630903 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:12.200737953 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:12.200930119 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:12.202721119 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:12.202733040 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:12.202817917 CEST49808443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:12.202830076 CEST4434980878.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:18.142224073 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:18.142267942 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:18.142793894 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:18.142985106 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:18.143002987 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:18.587896109 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:18.588496923 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:18.588506937 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:18.589541912 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:18.589826107 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:18.590631008 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:18.590734005 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:18.591010094 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:18.591022015 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:18.637993097 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:19.075742960 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:19.075845003 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:19.076097965 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:19.077627897 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:19.077647924 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:19.077816010 CEST49809443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:19.077828884 CEST4434980978.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:28.576244116 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:28.576267958 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:28.576483965 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:28.576798916 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:28.576809883 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.016805887 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.017297029 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:29.017307997 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.018234015 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.018450975 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:29.019234896 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:29.019339085 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.019505024 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:29.019515991 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.073128939 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:29.497076035 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.497210026 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.497383118 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:29.498738050 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:29.498750925 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:29.498764038 CEST49810443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:29.498770952 CEST4434981078.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:42.135531902 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:42.135555029 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:42.135901928 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:42.136295080 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:42.136306047 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:42.577907085 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:42.578475952 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:42.578484058 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:42.579406023 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:42.579673052 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:42.580559015 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:42.580661058 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:42.580935955 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:42.580945969 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:42.632601976 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:43.057334900 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:43.057419062 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:43.058427095 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:43.060251951 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:43.060251951 CEST49811443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:43.060265064 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:43.060269117 CEST4434981178.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:44.572529078 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:44.572551012 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:44.572920084 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:44.573098898 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:44.573107958 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.015058041 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.015758038 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:45.015767097 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.016782999 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.017142057 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:45.017899990 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:45.018019915 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.018281937 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:45.018291950 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.069572926 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:45.493626118 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.493737936 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.493958950 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:45.496042013 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:45.496042013 CEST49813443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:45.496232986 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:45.496234894 CEST4434981378.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:49.134674072 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:49.135107994 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:49.136639118 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:49.136830091 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:49.136837959 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:49.576323032 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:49.578027010 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:49.578407049 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:49.579265118 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:49.580385923 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:49.581382990 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:49.581762075 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:49.582906008 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:49.583368063 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:49.631083012 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:50.052357912 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:50.052360058 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:50.053689003 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:50.055067062 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:50.055075884 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:50.055255890 CEST49814443192.168.11.3078.47.165.25
                                      Sep 3, 2024 10:14:50.055260897 CEST4434981478.47.165.25192.168.11.30
                                      Sep 3, 2024 10:14:53.770395994 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:53.770421982 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:53.770771980 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:53.771249056 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:53.771260977 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.209688902 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.210187912 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:54.210206032 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.212255001 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.212547064 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:54.213553905 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:54.213730097 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.214117050 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:54.214132071 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.255038023 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:54.687108994 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.687201023 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.687534094 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:54.688965082 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:54.688965082 CEST49815443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:54.689347982 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:54.689349890 CEST443498155.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.256949902 CEST49816443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.256979942 CEST443498165.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.257328987 CEST49816443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.257519960 CEST49816443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.257530928 CEST443498165.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.263294935 CEST49816443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.288247108 CEST49817443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.288274050 CEST443498175.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.288630962 CEST49817443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.288872957 CEST49817443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.288883924 CEST443498175.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.291249990 CEST49817443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.308197021 CEST443498165.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.319118023 CEST49818443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.319148064 CEST443498185.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.319499016 CEST49818443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.319686890 CEST49818443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.319698095 CEST443498185.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.322648048 CEST49818443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.336184025 CEST443498175.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.351088047 CEST49819443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.351133108 CEST443498195.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.351465940 CEST49819443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.351655960 CEST49819443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.351672888 CEST443498195.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.359306097 CEST49819443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.368184090 CEST443498185.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.382677078 CEST49820443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.382704020 CEST443498205.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.383057117 CEST49820443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.383296013 CEST49820443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.383307934 CEST443498205.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.387207985 CEST49820443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.400182009 CEST443498195.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.413407087 CEST49821443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.413434982 CEST443498215.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.413789034 CEST49821443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.414170980 CEST49821443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.414180994 CEST443498215.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.417265892 CEST49821443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.428181887 CEST443498205.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.445995092 CEST49822443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.446022034 CEST443498225.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.446805000 CEST49822443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.447176933 CEST49822443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.447187901 CEST443498225.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.449829102 CEST49822443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.464183092 CEST443498215.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.476274014 CEST49823443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.476295948 CEST443498235.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.476635933 CEST49823443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.477018118 CEST49823443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.477027893 CEST443498235.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.480688095 CEST49823443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.496515036 CEST443498225.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.507669926 CEST49824443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.507690907 CEST443498245.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.507971048 CEST49824443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.508322954 CEST49824443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.508335114 CEST443498245.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.512376070 CEST49824443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.528188944 CEST443498235.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.539592028 CEST49825443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.540224075 CEST443498255.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.541683912 CEST49825443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.541914940 CEST49825443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.542294025 CEST443498255.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.543915033 CEST49825443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.560182095 CEST443498245.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.571046114 CEST49826443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.571067095 CEST443498265.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.571427107 CEST49826443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.571702957 CEST49826443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.571713924 CEST443498265.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.574909925 CEST49826443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.588372946 CEST443498255.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.602148056 CEST49827443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.602173090 CEST443498275.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.602415085 CEST49827443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.602833033 CEST49827443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.602843046 CEST443498275.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.606641054 CEST49827443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.616194963 CEST443498265.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.632853031 CEST49828443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.632874966 CEST443498285.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.633116007 CEST49828443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.633441925 CEST49828443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.633470058 CEST443498285.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.637662888 CEST49828443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.648186922 CEST443498275.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.664024115 CEST49829443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.664062023 CEST443498295.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.664405107 CEST49829443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.664824963 CEST49829443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.664835930 CEST443498295.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.676640034 CEST49829443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.680181980 CEST443498285.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.694598913 CEST443498165.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.694735050 CEST443498165.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.695831060 CEST49816443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.695831060 CEST49816443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.710987091 CEST49830443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.711014032 CEST443498305.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.711297035 CEST49830443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.711632967 CEST49830443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.711641073 CEST443498305.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.716456890 CEST49830443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.720182896 CEST443498295.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.725727081 CEST443498175.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.725876093 CEST443498175.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.726075888 CEST49817443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.726269007 CEST49817443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.741960049 CEST49831443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.742913008 CEST443498315.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.743779898 CEST49831443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.744036913 CEST49831443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.744059086 CEST443498315.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.751096964 CEST49831443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.760184050 CEST443498305.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.760838985 CEST443498185.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.760967970 CEST443498185.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.761303902 CEST49818443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.761303902 CEST49818443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.772656918 CEST49832443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.772681952 CEST443498325.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.773992062 CEST49832443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.774306059 CEST49832443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.774316072 CEST443498325.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.783476114 CEST49832443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.789653063 CEST443498195.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.789797068 CEST443498195.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.789969921 CEST49819443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.790148020 CEST49819443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.792335987 CEST443498315.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.804116964 CEST49833443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.804141045 CEST443498335.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.804311991 CEST49833443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.804588079 CEST49833443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.804599047 CEST443498335.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.808722973 CEST49833443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.826158047 CEST443498205.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.826268911 CEST443498205.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.826538086 CEST49820443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.826538086 CEST49820443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.828377962 CEST443498325.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.836167097 CEST49834443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.836194992 CEST443498345.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.836425066 CEST49834443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.836689949 CEST49834443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.836702108 CEST443498345.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.846326113 CEST49834443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.852200985 CEST443498215.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.852308989 CEST443498215.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.852427959 CEST49821443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.852622032 CEST49821443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.856182098 CEST443498335.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.867273092 CEST49835443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.867297888 CEST443498355.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.867539883 CEST49835443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.867919922 CEST49835443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.867928028 CEST443498355.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.875710011 CEST49835443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.890146017 CEST443498225.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.890147924 CEST443498225.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.891659021 CEST49822443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.891659021 CEST49822443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.892184019 CEST443498345.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.902065992 CEST49836443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.902719021 CEST443498365.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.904263973 CEST49836443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.904608011 CEST49836443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.904624939 CEST443498365.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.905554056 CEST49836443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.920010090 CEST443498235.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.920131922 CEST443498235.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.920182943 CEST443498355.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.920308113 CEST49823443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.920308113 CEST49823443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.929182053 CEST49837443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.929207087 CEST443498375.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.929440022 CEST49837443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.929732084 CEST49837443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.929744959 CEST443498375.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.934663057 CEST49837443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.945103884 CEST443498245.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.945297956 CEST443498245.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.945374966 CEST49824443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.945735931 CEST49824443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.952183962 CEST443498365.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.960021019 CEST49838443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.960047960 CEST443498385.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.960299015 CEST49838443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.960552931 CEST49838443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.960565090 CEST443498385.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.964380026 CEST49838443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.980192900 CEST443498375.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.981431961 CEST443498255.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.981592894 CEST49825443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.991694927 CEST49839443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.991729021 CEST443498395.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:58.991928101 CEST49839443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.992283106 CEST49839443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:58.992295980 CEST443498395.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.001534939 CEST49839443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.008183002 CEST443498385.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.010293961 CEST443498265.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.010415077 CEST443498265.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.010505915 CEST49826443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.010607958 CEST49826443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.022463083 CEST49840443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.022484064 CEST443498405.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.022933960 CEST49840443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.023340940 CEST49840443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.023354053 CEST443498405.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.026372910 CEST49840443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.041635036 CEST443498275.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.041754961 CEST443498275.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.041850090 CEST49827443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.041938066 CEST49827443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.044183969 CEST443498395.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.053658009 CEST49841443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.054045916 CEST443498415.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.055322886 CEST49841443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.055623055 CEST49841443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.055635929 CEST443498415.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.057358980 CEST49841443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.068185091 CEST443498405.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.069772005 CEST443498285.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.069876909 CEST443498285.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.070043087 CEST49828443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.070148945 CEST49828443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.084829092 CEST49842443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.084856033 CEST443498425.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.085386038 CEST49842443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.085660934 CEST49842443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.085673094 CEST443498425.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.088634968 CEST49842443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.100512028 CEST443498415.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.102298021 CEST443498295.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.102412939 CEST443498295.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.102442980 CEST49829443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.102520943 CEST49829443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.116136074 CEST49843443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.116157055 CEST443498435.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.116437912 CEST49843443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.116657019 CEST49843443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.116668940 CEST443498435.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.120062113 CEST49843443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.132217884 CEST443498425.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.147162914 CEST49844443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.147183895 CEST443498445.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.147547007 CEST49844443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.147839069 CEST49844443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.147850990 CEST443498445.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.151246071 CEST443498305.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.151364088 CEST443498305.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.151552916 CEST49830443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.151640892 CEST49830443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.154400110 CEST49844443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.164182901 CEST443498435.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.178910017 CEST49845443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.179462910 CEST443498455.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.180897951 CEST49845443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.181123018 CEST49845443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.181178093 CEST443498455.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.181750059 CEST443498315.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.182126045 CEST443498315.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.183207035 CEST49845443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.183284044 CEST49831443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.183284044 CEST49831443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.200181961 CEST443498445.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.211612940 CEST49846443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.211639881 CEST443498465.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.211858988 CEST49846443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.212145090 CEST443498325.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.212167025 CEST49846443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.212183952 CEST443498465.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.212347984 CEST443498325.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.213267088 CEST49832443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.213747025 CEST49832443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.216379881 CEST49846443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.228666067 CEST443498455.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.241554022 CEST49847443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.241588116 CEST443498475.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.241715908 CEST443498335.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.241869926 CEST49847443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.241889000 CEST443498335.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.242013931 CEST49833443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.242144108 CEST49833443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.242185116 CEST49847443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.242194891 CEST443498475.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.244682074 CEST49847443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.264182091 CEST443498465.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.273962021 CEST443498345.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.274099112 CEST443498345.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.274218082 CEST49834443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.274389982 CEST49834443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.274389982 CEST49848443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.274667978 CEST443498485.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.276787996 CEST49848443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.277117014 CEST49848443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.277153969 CEST443498485.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.284487963 CEST49848443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.288183928 CEST443498475.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.303894997 CEST49849443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.304276943 CEST443498495.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.305939913 CEST49849443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.306392908 CEST49849443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.306406021 CEST443498495.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.308672905 CEST443498355.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.308809996 CEST443498355.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.308933973 CEST49835443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.308969021 CEST49849443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.309019089 CEST49835443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.332478046 CEST443498485.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.335521936 CEST49850443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.335541964 CEST443498505.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.335870028 CEST49850443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.336163998 CEST49850443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.336179972 CEST443498505.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.339227915 CEST49850443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.342706919 CEST443498365.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.342708111 CEST443498365.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.344295979 CEST49836443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.344295979 CEST49836443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.352418900 CEST443498495.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.366451025 CEST49851443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.366473913 CEST443498515.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.366735935 CEST49851443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.367117882 CEST49851443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.367126942 CEST443498515.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.369575977 CEST443498375.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.369693995 CEST443498375.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.369812012 CEST49837443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.369880915 CEST49837443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.378906012 CEST49851443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.380182981 CEST443498505.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.399924994 CEST443498385.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.400069952 CEST443498385.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.400132895 CEST49838443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.400299072 CEST49838443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.413892984 CEST49852443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.413919926 CEST443498525.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.414230108 CEST49852443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.414618969 CEST49852443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.414630890 CEST443498525.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.418730021 CEST49852443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.424181938 CEST443498515.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.431255102 CEST443498395.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.431392908 CEST443498395.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.431648016 CEST49839443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.431750059 CEST49839443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.445194006 CEST49853443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.445219040 CEST443498535.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.445621967 CEST49853443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.445899010 CEST49853443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.445910931 CEST443498535.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.448591948 CEST49853443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.460633993 CEST443498405.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.460777044 CEST443498405.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.460937977 CEST49840443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.461014032 CEST49840443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.464893103 CEST443498525.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.476108074 CEST49854443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.476135969 CEST443498545.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.476366043 CEST49854443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.476650000 CEST49854443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.476677895 CEST443498545.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.479149103 CEST49854443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.495223999 CEST443498415.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.495604038 CEST443498415.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.496582985 CEST443498535.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.497025013 CEST49841443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.497025013 CEST49841443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.506479025 CEST49855443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.506505966 CEST443498555.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.506738901 CEST49855443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.507042885 CEST49855443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.507055044 CEST443498555.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.510751009 CEST49855443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.520190001 CEST443498545.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.524729967 CEST443498425.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.524732113 CEST443498425.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.526771069 CEST49842443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.526771069 CEST49842443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.538572073 CEST49856443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.538599014 CEST443498565.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.538959980 CEST49856443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.539191008 CEST49856443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.539200068 CEST443498565.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.541924000 CEST49856443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.552213907 CEST443498555.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.554986000 CEST443498435.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.555152893 CEST443498435.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.555310965 CEST49843443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.555453062 CEST49843443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.570086002 CEST49857443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.570127964 CEST443498575.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.571562052 CEST49857443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.572074890 CEST49857443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.572817087 CEST443498575.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.573332071 CEST49857443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.585771084 CEST443498445.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.585941076 CEST443498445.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.585985899 CEST49844443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.586153984 CEST49844443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.588185072 CEST443498565.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.606147051 CEST49858443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.606177092 CEST443498585.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.606570005 CEST49858443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.607009888 CEST49858443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.607019901 CEST443498585.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.609724045 CEST49858443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.616204977 CEST443498575.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.619534016 CEST443498455.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.619535923 CEST443498455.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.621006012 CEST49845443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.621006012 CEST49845443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.632348061 CEST49859443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.632378101 CEST443498595.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.632735014 CEST49859443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.632942915 CEST49859443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.632952929 CEST443498595.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.635925055 CEST49859443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.650837898 CEST443498465.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.650973082 CEST443498465.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.651051044 CEST49846443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.651195049 CEST49846443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.656187057 CEST443498585.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.663882017 CEST49860443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.663913012 CEST443498605.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.664051056 CEST49860443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.664410114 CEST49860443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.664421082 CEST443498605.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.668744087 CEST49860443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.680186987 CEST443498595.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.682692051 CEST443498475.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.682818890 CEST443498475.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.682985067 CEST49847443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.683044910 CEST49847443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.696500063 CEST49861443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.696538925 CEST443498615.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.696832895 CEST49861443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.697216988 CEST49861443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.697227955 CEST443498615.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.701318026 CEST49861443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.712184906 CEST443498605.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.718322039 CEST443498485.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.718323946 CEST443498485.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.719578981 CEST49848443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.719578981 CEST49848443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.725789070 CEST49862443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.725811958 CEST443498625.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.726099968 CEST49862443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.726416111 CEST49862443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.726425886 CEST443498625.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.730753899 CEST49862443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.746134996 CEST443498495.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.746136904 CEST443498495.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.747526884 CEST49849443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.747526884 CEST49849443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.748183012 CEST443498615.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.757193089 CEST49863443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.757213116 CEST443498635.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.757468939 CEST49863443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.757759094 CEST49863443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.757769108 CEST443498635.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.770092964 CEST49863443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.772183895 CEST443498625.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.774328947 CEST443498505.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.774435997 CEST443498505.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.774683952 CEST49850443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.774775982 CEST49850443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.805944920 CEST49864443192.168.11.305.75.168.191
                                      Sep 3, 2024 10:14:59.805970907 CEST443498645.75.168.191192.168.11.30
                                      Sep 3, 2024 10:14:59.806139946 CEST49864443192.168.11.305.75.168.191
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Sep 3, 2024 10:13:39.767271042 CEST192.168.11.301.1.1.10x893fStandard query (0)getscreen.meA (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:13:52.227176905 CEST192.168.11.301.1.1.10x5201Standard query (0)getscreen.meA (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:14:53.648282051 CEST192.168.11.301.1.1.10x55a6Standard query (0)getscreen.meA (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:15:53.228427887 CEST192.168.11.301.1.1.10x7639Standard query (0)getscreen.meA (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:16:08.225328922 CEST192.168.11.301.1.1.10x8544Standard query (0)getscreen.meA (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:17:08.258656025 CEST192.168.11.301.1.1.10xde89Standard query (0)getscreen.meA (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:18:19.632138014 CEST192.168.11.301.1.1.10xb1e0Standard query (0)getscreen.meA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Sep 3, 2024 10:13:39.885983944 CEST1.1.1.1192.168.11.300x893fNo error (0)getscreen.me78.47.165.25A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:13:39.885983944 CEST1.1.1.1192.168.11.300x893fNo error (0)getscreen.me5.75.168.191A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:13:39.885983944 CEST1.1.1.1192.168.11.300x893fNo error (0)getscreen.me51.89.95.37A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:13:52.346618891 CEST1.1.1.1192.168.11.300x5201No error (0)getscreen.me78.47.165.25A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:13:52.346618891 CEST1.1.1.1192.168.11.300x5201No error (0)getscreen.me51.89.95.37A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:13:52.346618891 CEST1.1.1.1192.168.11.300x5201No error (0)getscreen.me5.75.168.191A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:14:53.768876076 CEST1.1.1.1192.168.11.300x55a6No error (0)getscreen.me5.75.168.191A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:14:53.768876076 CEST1.1.1.1192.168.11.300x55a6No error (0)getscreen.me78.47.165.25A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:14:53.768876076 CEST1.1.1.1192.168.11.300x55a6No error (0)getscreen.me51.89.95.37A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:15:53.347954988 CEST1.1.1.1192.168.11.300x7639No error (0)getscreen.me78.47.165.25A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:15:53.347954988 CEST1.1.1.1192.168.11.300x7639No error (0)getscreen.me5.75.168.191A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:15:53.347954988 CEST1.1.1.1192.168.11.300x7639No error (0)getscreen.me51.89.95.37A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:16:08.345309973 CEST1.1.1.1192.168.11.300x8544No error (0)getscreen.me5.75.168.191A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:16:08.345309973 CEST1.1.1.1192.168.11.300x8544No error (0)getscreen.me51.89.95.37A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:16:08.345309973 CEST1.1.1.1192.168.11.300x8544No error (0)getscreen.me78.47.165.25A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:17:08.378560066 CEST1.1.1.1192.168.11.300xde89No error (0)getscreen.me5.75.168.191A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:17:08.378560066 CEST1.1.1.1192.168.11.300xde89No error (0)getscreen.me51.89.95.37A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:17:08.378560066 CEST1.1.1.1192.168.11.300xde89No error (0)getscreen.me78.47.165.25A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:18:19.750973940 CEST1.1.1.1192.168.11.300xb1e0No error (0)getscreen.me78.47.165.25A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:18:19.750973940 CEST1.1.1.1192.168.11.300xb1e0No error (0)getscreen.me5.75.168.191A (IP address)IN (0x0001)false
                                      Sep 3, 2024 10:18:19.750973940 CEST1.1.1.1192.168.11.300xb1e0No error (0)getscreen.me51.89.95.37A (IP address)IN (0x0001)false
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.11.304980478.47.165.254438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:13:40 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:13:40 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:13:40 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 0
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:13:40 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.11.304980678.47.165.254438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:13:52 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:13:53 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:13:53 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 0
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:13:53 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.11.304980878.47.165.254438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:14:11 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:14:12 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:14:12 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 1
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:14:12 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.11.304980978.47.165.254438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:14:18 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:14:19 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:14:18 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 1
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:14:19 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.11.304981078.47.165.254438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:14:29 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:14:29 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:14:29 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 1
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:14:29 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.11.304981178.47.165.254438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:14:42 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:14:43 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:14:42 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 0
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:14:43 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.11.304981378.47.165.254438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:14:45 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:14:45 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:14:45 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 0
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:14:45 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.11.304981478.47.165.254438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:14:49 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:14:50 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:14:49 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 0
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:14:50 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.11.30498155.75.168.1914438892C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:14:54 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:14:54 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:14:54 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 3
                                      server: lb2.getscreen.me
                                      connection: close
                                      2024-09-03 08:14:54 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Session IDSource IPSource PortDestination IPDestination Port
                                      9192.168.11.305464978.47.165.25443
                                      TimestampBytes transferredDirectionData
                                      2024-09-03 08:18:20 UTC290OUTGET /signal/agent HTTP/1.1
                                      Host: getscreen.me
                                      Upgrade: websocket
                                      Connection: Upgrade
                                      Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                      Origin: https://getscreen.me
                                      Sec-WebSocket-Protocol: chat, superchat
                                      Sec-WebSocket-Version: 13
                                      User-Agent: Getscreen.me/2.21.3 (Win, getscreen.me, 2)
                                      2024-09-03 08:18:20 UTC265INHTTP/1.1 400 Bad Request
                                      content-type: text/plain; charset=utf-8
                                      sec-websocket-version: 13
                                      x-content-type-options: nosniff
                                      date: Tue, 03 Sep 2024 08:18:20 GMT
                                      content-length: 12
                                      x-envoy-upstream-service-time: 1
                                      server: lb1.getscreen.me
                                      connection: close
                                      2024-09-03 08:18:20 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                                      Data Ascii: Bad Request


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:6
                                      Start time:04:13:34
                                      Start date:03/09/2024
                                      Path:C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\getscreen-456311346-x86.exe"
                                      Imagebase:0x7f0000
                                      File size:3'654'448 bytes
                                      MD5 hash:DE8E90D5C46A3380029FB62D92744F41
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Target ID:7
                                      Start time:04:13:34
                                      Start date:03/09/2024
                                      Path:C:\Windows\System32\svchost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                      Imagebase:0x7ff77e2d0000
                                      File size:57'360 bytes
                                      MD5 hash:F586835082F632DC8D9404D83BC16316
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:false

                                      Target ID:8
                                      Start time:04:13:35
                                      Start date:03/09/2024
                                      Path:C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\getscreen-456311346-x86.exe" -gpipe \\.\pipe\PCommand97avnyqersrfjzkub -gui
                                      Imagebase:0x7f0000
                                      File size:3'654'448 bytes
                                      MD5 hash:DE8E90D5C46A3380029FB62D92744F41
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Target ID:10
                                      Start time:04:13:36
                                      Start date:03/09/2024
                                      Path:C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\ProgramData\Getscreen.me\dnmybolotevdhjfjcacchgwlchvsnes-elevate.exe" -elevate \\.\pipe\elevateGS512dnmybolotevdhjfjcacchgwlchvsnes
                                      Imagebase:0x4c0000
                                      File size:3'654'448 bytes
                                      MD5 hash:DE8E90D5C46A3380029FB62D92744F41
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      • Detection: 1%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:11
                                      Start time:04:13:38
                                      Start date:03/09/2024
                                      Path:C:\Windows\System32\svchost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
                                      Imagebase:0x7ff77e2d0000
                                      File size:57'360 bytes
                                      MD5 hash:F586835082F632DC8D9404D83BC16316
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:false

                                      Target ID:12
                                      Start time:04:13:38
                                      Start date:03/09/2024
                                      Path:C:\Users\user\Desktop\getscreen-456311346-x86.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\getscreen-456311346-x86.exe" -cpipe \\.\pipe\PCommand96evxxgkwekidqvpd -cmem 0000pipe0PCommand96evxxgkwekidqvpdw3wyrqdv7gow1iy -child
                                      Imagebase:0x7f0000
                                      File size:3'654'448 bytes
                                      MD5 hash:DE8E90D5C46A3380029FB62D92744F41
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:1.1%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:2.9%
                                        Total number of Nodes:244
                                        Total number of Limit Nodes:9
                                        execution_graph 14007 ebb62b 14008 ebb637 14007->14008 14009 ebb64b 14008->14009 14010 ebb63e GetLastError RtlExitUserThread 14008->14010 14013 ecf42c GetLastError 14009->14013 14010->14009 14012 ebb650 14014 ecf442 14013->14014 14024 ecf44c SetLastError 14014->14024 14049 ecf717 14014->14049 14017 ecf4dc 14017->14012 14018 ecf479 14019 ecf4b9 14018->14019 14021 ecf481 14018->14021 14058 ecf25a 14019->14058 14020 ecf4e1 14027 ecf717 3 API calls 14020->14027 14028 ecf4fe 14020->14028 14054 ecf066 14021->14054 14024->14017 14024->14020 14026 ecf066 2 API calls 14026->14024 14031 ecf522 14027->14031 14029 ecf57d GetLastError 14028->14029 14040 ecf503 14028->14040 14030 ecf593 14029->14030 14038 ecf717 3 API calls 14030->14038 14046 ecf59d SetLastError 14030->14046 14032 ecf55e 14031->14032 14034 ecf52a 14031->14034 14035 ecf25a 4 API calls 14032->14035 14033 ecf066 2 API calls 14033->14028 14034->14033 14037 ecf569 14035->14037 14039 ecf066 2 API calls 14037->14039 14041 ecf5ca 14038->14041 14039->14040 14040->14012 14042 ecf60a 14041->14042 14043 ecf5d2 14041->14043 14045 ecf25a 4 API calls 14042->14045 14044 ecf066 2 API calls 14043->14044 14044->14046 14047 ecf615 14045->14047 14046->14012 14048 ecf066 2 API calls 14047->14048 14048->14046 14052 ecf724 14049->14052 14050 ecf74f RtlAllocateHeap 14051 ecf762 14050->14051 14050->14052 14051->14018 14052->14050 14052->14051 14063 ecbfcd 14052->14063 14055 ecf071 RtlFreeHeap 14054->14055 14057 ecf093 14054->14057 14056 ecf086 GetLastError 14055->14056 14055->14057 14056->14057 14057->14024 14077 ecf0ee 14058->14077 14066 ecbff9 14063->14066 14067 ecc005 14066->14067 14072 ebf2a5 RtlEnterCriticalSection 14067->14072 14069 ecc010 14073 ecc047 14069->14073 14072->14069 14076 ebf2ed RtlLeaveCriticalSection 14073->14076 14075 ecbfd8 14075->14052 14076->14075 14078 ecf0fa 14077->14078 14091 ebf2a5 RtlEnterCriticalSection 14078->14091 14080 ecf104 14092 ecf134 14080->14092 14083 ecf200 14084 ecf20c 14083->14084 14096 ebf2a5 RtlEnterCriticalSection 14084->14096 14086 ecf216 14097 ecf3e1 14086->14097 14088 ecf22e 14101 ecf24e 14088->14101 14091->14080 14095 ebf2ed RtlLeaveCriticalSection 14092->14095 14094 ecf122 14094->14083 14095->14094 14096->14086 14098 ecf417 14097->14098 14099 ecf3f0 14097->14099 14098->14088 14099->14098 14104 edbdf2 14099->14104 14218 ebf2ed RtlLeaveCriticalSection 14101->14218 14103 ecf23c 14103->14026 14105 edbe72 14104->14105 14109 edbe08 14104->14109 14107 ecf066 2 API calls 14105->14107 14130 edbec0 14105->14130 14110 edbe94 14107->14110 14108 edbece 14120 edbf2e 14108->14120 14129 ecf066 RtlFreeHeap GetLastError 14108->14129 14109->14105 14113 edbe3b 14109->14113 14115 ecf066 2 API calls 14109->14115 14111 ecf066 2 API calls 14110->14111 14112 edbea7 14111->14112 14117 ecf066 2 API calls 14112->14117 14118 ecf066 2 API calls 14113->14118 14131 edbe5d 14113->14131 14114 ecf066 2 API calls 14119 edbe67 14114->14119 14116 edbe30 14115->14116 14132 edb237 14116->14132 14122 edbeb5 14117->14122 14123 edbe52 14118->14123 14124 ecf066 2 API calls 14119->14124 14125 ecf066 2 API calls 14120->14125 14127 ecf066 2 API calls 14122->14127 14160 edb696 14123->14160 14124->14105 14126 edbf34 14125->14126 14126->14098 14127->14130 14129->14108 14172 edbf63 14130->14172 14131->14114 14133 edb248 14132->14133 14159 edb331 14132->14159 14134 edb259 14133->14134 14135 ecf066 2 API calls 14133->14135 14136 ecf066 2 API calls 14134->14136 14138 edb26b 14134->14138 14135->14134 14136->14138 14137 edb27d 14140 edb28f 14137->14140 14142 ecf066 2 API calls 14137->14142 14138->14137 14139 ecf066 2 API calls 14138->14139 14139->14137 14141 edb2a1 14140->14141 14143 ecf066 2 API calls 14140->14143 14144 edb2b3 14141->14144 14145 ecf066 2 API calls 14141->14145 14142->14140 14143->14141 14146 edb2c5 14144->14146 14147 ecf066 2 API calls 14144->14147 14145->14144 14148 edb2d7 14146->14148 14150 ecf066 2 API calls 14146->14150 14147->14146 14149 edb2e9 14148->14149 14151 ecf066 2 API calls 14148->14151 14152 edb2fb 14149->14152 14153 ecf066 2 API calls 14149->14153 14150->14148 14151->14149 14154 edb30d 14152->14154 14155 ecf066 2 API calls 14152->14155 14153->14152 14156 edb31f 14154->14156 14157 ecf066 2 API calls 14154->14157 14155->14154 14158 ecf066 2 API calls 14156->14158 14156->14159 14157->14156 14158->14159 14159->14113 14161 edb6fb 14160->14161 14162 edb6a3 14160->14162 14161->14131 14163 edb6b3 14162->14163 14164 ecf066 2 API calls 14162->14164 14165 edb6c5 14163->14165 14166 ecf066 2 API calls 14163->14166 14164->14163 14167 edb6d7 14165->14167 14169 ecf066 2 API calls 14165->14169 14166->14165 14168 edb6e9 14167->14168 14170 ecf066 2 API calls 14167->14170 14168->14161 14171 ecf066 2 API calls 14168->14171 14169->14167 14170->14168 14171->14161 14173 edbf8f 14172->14173 14174 edbf70 14172->14174 14173->14108 14174->14173 14178 edbbbd 14174->14178 14177 ecf066 2 API calls 14177->14173 14179 edbc9b 14178->14179 14180 edbbce 14178->14180 14179->14177 14214 edb91c 14180->14214 14183 edb91c 2 API calls 14184 edbbe1 14183->14184 14185 edb91c 2 API calls 14184->14185 14186 edbbec 14185->14186 14187 edb91c 2 API calls 14186->14187 14188 edbbf7 14187->14188 14189 edb91c 2 API calls 14188->14189 14190 edbc05 14189->14190 14191 ecf066 2 API calls 14190->14191 14192 edbc10 14191->14192 14193 ecf066 2 API calls 14192->14193 14194 edbc1b 14193->14194 14195 ecf066 2 API calls 14194->14195 14196 edbc26 14195->14196 14197 edb91c 2 API calls 14196->14197 14198 edbc34 14197->14198 14199 edb91c 2 API calls 14198->14199 14200 edbc42 14199->14200 14201 edb91c 2 API calls 14200->14201 14202 edbc53 14201->14202 14203 edb91c 2 API calls 14202->14203 14204 edbc61 14203->14204 14205 edb91c 2 API calls 14204->14205 14206 edbc6f 14205->14206 14207 ecf066 2 API calls 14206->14207 14208 edbc7a 14207->14208 14209 ecf066 2 API calls 14208->14209 14210 edbc85 14209->14210 14211 ecf066 2 API calls 14210->14211 14212 edbc90 14211->14212 14213 ecf066 2 API calls 14212->14213 14213->14179 14217 edb92e 14214->14217 14215 edb93d 14215->14183 14216 ecf066 2 API calls 14216->14217 14217->14215 14217->14216 14218->14103 14219 1f429e0 14220 1f429f8 14219->14220 14221 1f42b03 LoadLibraryA 14220->14221 14222 1f42b48 VirtualProtect VirtualProtect 14220->14222 14224 1f42b2c GetProcAddress 14220->14224 14221->14220 14225 1f42bc0 14222->14225 14224->14220 14226 1f42b42 ExitProcess 14224->14226 14227 857900 14228 857984 14227->14228 14229 85790c 14227->14229 14231 eb5f15 14229->14231 14232 ecf066 2 API calls 14231->14232 14233 eb5f2d 14232->14233 14233->14228 14234 95b829 SetLastError 14235 95b88c 14234->14235 14239 95b841 14234->14239 14243 dcf1f8 14235->14243 14244 dcf206 14243->14244 14247 eb23ce 14244->14247 14246 dcf214 14248 eb23e8 14247->14248 14249 eb2415 KiUserExceptionDispatcher 14247->14249 14248->14249 14249->14246 14250 84d00a 14261 84be18 14250->14261 14254 84d01f 14277 8e2edc 14254->14277 14256 84d030 14257 84be18 11 API calls 14256->14257 14258 84d049 14257->14258 14259 84c13c 5 API calls 14258->14259 14260 84d052 14259->14260 14262 84be41 14261->14262 14263 84be39 14261->14263 14288 eaff78 RtlAcquireSRWLockExclusive 14262->14288 14271 84c13c 14263->14271 14265 84be4b 14265->14263 14293 eafecc 14265->14293 14267 84be5e 14300 84be80 RtlInitializeCriticalSection TlsAlloc 14267->14300 14269 84be6a 14301 eaff27 RtlAcquireSRWLockExclusive RtlReleaseSRWLockExclusive RtlWakeAllConditionVariable 14269->14301 14272 84c153 TlsGetValue 14271->14272 14273 84c14a 14271->14273 14274 84c167 TlsSetValue 14272->14274 14276 84c151 14272->14276 14303 84c178 14273->14303 14274->14254 14276->14274 14278 8e300b 14277->14278 14282 8e2f33 14277->14282 14280 eaff78 3 API calls 14278->14280 14279 8e2fbf KiUserExceptionDispatcher 14279->14256 14281 8e3015 14280->14281 14281->14282 14284 8e3025 GetModuleHandleA GetProcAddress 14281->14284 14282->14279 14283 8e2f92 GetCurrentThread 14282->14283 14286 8e2fb5 SetThreadDescription 14283->14286 14306 eaff27 RtlAcquireSRWLockExclusive RtlReleaseSRWLockExclusive RtlWakeAllConditionVariable 14284->14306 14286->14279 14287 8e3059 14287->14282 14289 eaff8c 14288->14289 14290 eaff91 RtlReleaseSRWLockExclusive 14289->14290 14302 eaffc7 SleepConditionVariableSRW 14289->14302 14290->14265 14295 eafed1 14293->14295 14294 eafeeb 14294->14267 14295->14294 14296 ecbfcd 2 API calls 14295->14296 14297 eafeed 14295->14297 14296->14295 14298 eb23ce KiUserExceptionDispatcher 14297->14298 14299 eb0ffb 14298->14299 14299->14267 14300->14269 14301->14263 14302->14289 14304 eafecc 3 API calls 14303->14304 14305 84c187 14304->14305 14305->14276 14306->14287

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 14 1f429e0-1f429f0 15 1f42a02-1f42a07 14->15 16 1f42a09 15->16 17 1f429f8-1f429fd 16->17 18 1f42a0b 16->18 19 1f429fe-1f42a00 17->19 20 1f42a10-1f42a12 18->20 19->15 19->16 21 1f42a14-1f42a19 20->21 22 1f42a1b-1f42a1f 20->22 21->22 23 1f42a21 22->23 24 1f42a2c-1f42a2f 22->24 25 1f42a23-1f42a2a 23->25 26 1f42a4b-1f42a50 23->26 27 1f42a31-1f42a36 24->27 28 1f42a38-1f42a3a 24->28 25->24 25->26 29 1f42a52-1f42a5b 26->29 30 1f42a63-1f42a65 26->30 27->28 28->20 31 1f42ad2-1f42ad5 29->31 32 1f42a5d-1f42a61 29->32 33 1f42a67-1f42a6c 30->33 34 1f42a6e 30->34 35 1f42ada 31->35 32->34 33->34 36 1f42a70-1f42a73 34->36 37 1f42a3c-1f42a3e 34->37 42 1f42adc-1f42ade 35->42 38 1f42a75-1f42a7a 36->38 39 1f42a7c 36->39 40 1f42a47-1f42a49 37->40 41 1f42a40-1f42a45 37->41 38->39 39->37 45 1f42a7e-1f42a80 39->45 46 1f42a9d-1f42aac 40->46 41->40 43 1f42af7 42->43 44 1f42ae0-1f42ae3 42->44 48 1f42afd-1f42b01 43->48 44->42 47 1f42ae5-1f42af5 44->47 49 1f42a82-1f42a87 45->49 50 1f42a89-1f42a8d 45->50 51 1f42abc-1f42ac9 46->51 52 1f42aae-1f42ab5 46->52 47->35 53 1f42b03-1f42b19 LoadLibraryA 48->53 54 1f42b48-1f42b4b 48->54 49->50 50->45 55 1f42a8f 50->55 51->51 57 1f42acb-1f42acd 51->57 52->52 56 1f42ab7 52->56 58 1f42b1a-1f42b1f 53->58 61 1f42b4e-1f42b55 54->61 59 1f42a91-1f42a98 55->59 60 1f42a9a 55->60 56->19 57->19 58->48 62 1f42b21-1f42b23 58->62 59->45 59->60 60->46 63 1f42b57-1f42b59 61->63 64 1f42b79-1f42bbd VirtualProtect * 2 61->64 65 1f42b25-1f42b2b 62->65 66 1f42b2c-1f42b39 GetProcAddress 62->66 67 1f42b6c-1f42b77 63->67 68 1f42b5b-1f42b6a 63->68 69 1f42bc0-1f42bc1 64->69 65->66 70 1f42b42 ExitProcess 66->70 71 1f42b3b-1f42b40 66->71 67->68 68->61 72 1f42bc5-1f42bc9 69->72 71->58 72->72 73 1f42bcb 72->73
                                        APIs
                                        • LoadLibraryA.KERNEL32(?), ref: 01F42B13
                                        • GetProcAddress.KERNEL32(?,01F1CFF9), ref: 01F42B31
                                        • ExitProcess.KERNEL32(?,01F1CFF9), ref: 01F42B42
                                        • VirtualProtect.KERNEL32(007F0000,00001000,00000004,?,00000000), ref: 01F42B90
                                        • VirtualProtect.KERNEL32(007F0000,00001000), ref: 01F42BA5
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                        • String ID:
                                        • API String ID: 1996367037-0
                                        • Opcode ID: b4426a8895f4a276993f9d2c5052c8bb1ce0b6a76b17c812a6aed6cc869a2cb1
                                        • Instruction ID: 03bcf5dd786e42a02dbed445049c1b19f0b6c4bdc04c7f42e5879514b604a415
                                        • Opcode Fuzzy Hash: b4426a8895f4a276993f9d2c5052c8bb1ce0b6a76b17c812a6aed6cc869a2cb1
                                        • Instruction Fuzzy Hash: 4C510572A107129BD7318EBCECC0664BF95EB4123471C0738EEE2D73C6EBA5594A8760

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentThread.KERNEL32 ref: 008E2FA5
                                        • SetThreadDescription.KERNELBASE(00000000,?), ref: 008E2FBD
                                        • KiUserExceptionDispatcher.NTDLL(406D1388,00000000,00000004,?), ref: 008E2FEA
                                        • GetModuleHandleA.KERNEL32(Kernel32.dll), ref: 008E3031
                                        • GetProcAddress.KERNEL32(00000000,SetThreadDescription), ref: 008E303D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Thread$AddressCurrentDescriptionDispatcherExceptionHandleModuleProcUser
                                        • String ID: Kernel32.dll$SetThreadDescription
                                        • API String ID: 2856497764-1724334159
                                        • Opcode ID: e40efcd5cd6db058ea68a7b679a37bee83f345bb84c7e530d8fa7eeb73fa24c7
                                        • Instruction ID: 74684bfc0bc2ed87f21b235bf76aa56daa0a6eda56bdc81aa570d76a897e38b0
                                        • Opcode Fuzzy Hash: e40efcd5cd6db058ea68a7b679a37bee83f345bb84c7e530d8fa7eeb73fa24c7
                                        • Instruction Fuzzy Hash: 3941C2B1D00785DFD720CF54D848BAAB7B4FF8A720F108359E8A997391DB745985CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 74 ecf42c-ecf440 GetLastError 75 ecf45c-ecf466 call ed11f3 74->75 76 ecf442-ecf44a call ed11b4 74->76 83 ecf46c-ecf474 call ecf717 75->83 84 ecf468-ecf46a 75->84 81 ecf44c-ecf455 76->81 82 ecf457 76->82 85 ecf4d1-ecf4da SetLastError 81->85 82->75 87 ecf479-ecf47f 83->87 84->85 88 ecf4dc-ecf4e0 85->88 89 ecf4e1-ecf4f0 call eb6463 85->89 90 ecf481-ecf490 call ed11f3 87->90 91 ecf492-ecf4a0 call ed11f3 87->91 96 ecf50a-ecf514 call ed11f3 89->96 97 ecf4f2-ecf4fc call ed11b4 89->97 104 ecf4b1-ecf4b7 call ecf066 90->104 100 ecf4b9-ecf4ce call ecf25a call ecf066 91->100 101 ecf4a2-ecf4b0 call ed11f3 91->101 115 ecf516-ecf528 call ecf717 96->115 116 ecf577-ecf591 call eb6463 GetLastError 96->116 111 ecf4fe-ecf501 97->111 112 ecf505 97->112 119 ecf4d0 100->119 101->104 104->119 111->116 118 ecf503 111->118 112->96 127 ecf53f-ecf54d call ed11f3 115->127 128 ecf52a-ecf536 call ed11f3 115->128 129 ecf5ad-ecf5b7 call ed11f3 116->129 130 ecf593-ecf59b call ed11b4 116->130 123 ecf573-ecf576 118->123 119->85 139 ecf55e-ecf570 call ecf25a call ecf066 127->139 140 ecf54f-ecf55c call ed11f3 127->140 137 ecf537-ecf53d call ecf066 128->137 147 ecf5bd-ecf5d0 call ecf717 129->147 148 ecf5b9-ecf5bb 129->148 143 ecf59d-ecf5a6 130->143 144 ecf5a8 130->144 137->116 139->123 140->137 150 ecf622-ecf62d SetLastError 143->150 144->129 157 ecf5d2-ecf5e1 call ed11f3 147->157 158 ecf5e3-ecf5f1 call ed11f3 147->158 148->150 163 ecf602-ecf608 call ecf066 157->163 164 ecf60a-ecf61f call ecf25a call ecf066 158->164 165 ecf5f3-ecf601 call ed11f3 158->165 172 ecf621 163->172 164->172 165->163 172->150
                                        APIs
                                        • GetLastError.KERNEL32(?,?,00EBB650,01010388,0000000C), ref: 00ECF430
                                        • SetLastError.KERNEL32(00000000), ref: 00ECF4D2
                                        • GetLastError.KERNEL32(00000000,?,00EB5FDD,00ECF0E3,?,?,00E5F77A,0000000C,?,?,?,?,00DD27D2,?,?,?), ref: 00ECF581
                                        • SetLastError.KERNEL32(00000000,000000FF,00000006), ref: 00ECF623
                                          • Part of subcall function 00ECF717: RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 00ECF758
                                          • Part of subcall function 00ECF066: RtlFreeHeap.NTDLL(00000000,00000000,?,00EDB935,?,00000000,?,?,00EDBBD6,?,00000007,?,?,00EDBF89,?,?), ref: 00ECF07C
                                          • Part of subcall function 00ECF066: GetLastError.KERNEL32(?,?,00EDB935,?,00000000,?,?,00EDBBD6,?,00000007,?,?,00EDBF89,?,?), ref: 00ECF087
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorLast$Heap$AllocateFree
                                        • String ID:
                                        • API String ID: 2037364846-0
                                        • Opcode ID: fef0f1b79598cce020250d6c716e304c179bf68359e5d742541a92845c7f99a3
                                        • Instruction ID: 446637273f71b748f031c4631b14be6c0202ab9098176e3bb7930fa57e33e1a4
                                        • Opcode Fuzzy Hash: fef0f1b79598cce020250d6c716e304c179bf68359e5d742541a92845c7f99a3
                                        • Instruction Fuzzy Hash: 2D510F35605311BED7353A74AEC3F6B369AEF10764F2021B9FB10B6191DA3B8D078250

                                        Control-flow Graph

                                        APIs
                                        • GetLastError.KERNEL32(01010388,0000000C), ref: 00EBB63E
                                        • RtlExitUserThread.NTDLL(00000000), ref: 00EBB645
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorExitLastThreadUser
                                        • String ID:
                                        • API String ID: 1750398979-0
                                        • Opcode ID: ed08ef55a65982a11742ecac4149bce95be1b1f0b092a86d06beb491153abf04
                                        • Instruction ID: 841b1aa14dce93aa22dd80278b323dbeffa89273934e622eb11714f8b37cbfcb
                                        • Opcode Fuzzy Hash: ed08ef55a65982a11742ecac4149bce95be1b1f0b092a86d06beb491153abf04
                                        • Instruction Fuzzy Hash: A0F0C2B1900204AFDB04AFB0D80ABAF7BB5EF40710F205189F412BB2A2CB745942CBA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 194 ecf066-ecf06f 195 ecf09e-ecf09f 194->195 196 ecf071-ecf084 RtlFreeHeap 194->196 196->195 197 ecf086-ecf09d GetLastError call eb5f3b call eb5fd8 196->197 197->195
                                        APIs
                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00EDB935,?,00000000,?,?,00EDBBD6,?,00000007,?,?,00EDBF89,?,?), ref: 00ECF07C
                                        • GetLastError.KERNEL32(?,?,00EDB935,?,00000000,?,?,00EDBBD6,?,00000007,?,?,00EDBF89,?,?), ref: 00ECF087
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 485612231-0
                                        • Opcode ID: dbac729e7905f5726c5a9c47759ebe7240ed08ca3f5a076736ece41833e77f87
                                        • Instruction ID: 1ec886d8d8a0b0d436986a8b0bf5e4d9b5a24dc14c9301be60cf74d46d56c292
                                        • Opcode Fuzzy Hash: dbac729e7905f5726c5a9c47759ebe7240ed08ca3f5a076736ece41833e77f87
                                        • Instruction Fuzzy Hash: 36E086722006186BDB312FB5EE09BEA7A9A9B40755F101034F60CB60A1D7718991C794

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 202 eb23ce-eb23e6 203 eb23e8-eb23eb 202->203 204 eb2415-eb2437 KiUserExceptionDispatcher 202->204 205 eb240b-eb240e 203->205 206 eb23ed-eb2409 203->206 205->204 207 eb2410 205->207 206->204 206->205 207->204
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL(E06D7363,00000001,00000003,00EB0FFB,?,?,?,?,00EB0FFB,?,01010BD8), ref: 00EB242E
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: a648c022718086ff2d00e71b2de0771e8469b829b4a356c2e54f03a9181cf58b
                                        • Instruction ID: 8d9bee38a67ce703ea2e94ca4743e36daeda6256814a3d3f1ff35a3268f63c57
                                        • Opcode Fuzzy Hash: a648c022718086ff2d00e71b2de0771e8469b829b4a356c2e54f03a9181cf58b
                                        • Instruction Fuzzy Hash: F0018F75900209AFC7019F5CD880BEFBBB9EF88715F154169EA15AB391D770ED41CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 210 ecf717-ecf722 211 ecf724-ecf72e 210->211 212 ecf730-ecf736 210->212 211->212 213 ecf764-ecf76f call eb5fd8 211->213 214 ecf74f-ecf760 RtlAllocateHeap 212->214 215 ecf738-ecf739 212->215 220 ecf771-ecf773 213->220 216 ecf73b-ecf742 call ece7a5 214->216 217 ecf762 214->217 215->214 216->213 223 ecf744-ecf74d call ecbfcd 216->223 217->220 223->213 223->214
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 00ECF758
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 596be102f305a70ab41d9c2fe4800c405c5b176b97cd4cfabe1342b32d20446c
                                        • Instruction ID: f36cda9d86aeeeace8f3178bc71ca16980724a79f626f009b079d51b69c43598
                                        • Opcode Fuzzy Hash: 596be102f305a70ab41d9c2fe4800c405c5b176b97cd4cfabe1342b32d20446c
                                        • Instruction Fuzzy Hash: 4AF0B431624634669B226F269F05FAF378AAF41764B15703BFC14B7180CA32D81386E0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 226 95b829-95b83f SetLastError 227 95b841-95b84e 226->227 228 95b88c-95b8c0 call dcf1f8 call eafecc 226->228 234 95b852-95b854 227->234 235 95b8e0-95b8fc 228->235 236 95b8c2-95b8dd 228->236 237 95b856-95b85b 234->237 238 95b883-95b889 234->238 241 95b903 235->241 242 95b8fe-95b901 235->242 236->235 239 95b85d-95b875 237->239 240 95b87a-95b880 call eafc88 237->240 239->240 240->238 244 95b906-95b91e call d42ba0 241->244 242->244
                                        APIs
                                        • SetLastError.KERNEL32(00000000), ref: 0095B834
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID:
                                        • API String ID: 1452528299-0
                                        • Opcode ID: 45884eaf19f7c016a1088eb89397a0259927ddce27024ec31b27e6ded6924948
                                        • Instruction ID: d8063c4400c8f77e8e688badb9e0c49a5af968c0ff180ef7e465d0d996e9124c
                                        • Opcode Fuzzy Hash: 45884eaf19f7c016a1088eb89397a0259927ddce27024ec31b27e6ded6924948
                                        • Instruction Fuzzy Hash: E231A1B5A003299FC710DF6AC884A6BBBA9FF88710B054529EE499B351D731FC44CBE0
                                        APIs
                                        • LoadLibraryA.KERNEL32(wtsapi32.dll,00E67168), ref: 00E6744E
                                        • GetProcAddress.KERNEL32(00000000,WTSStopRemoteControlSession), ref: 00E6746B
                                        • GetProcAddress.KERNEL32(WTSStartRemoteControlSessionW), ref: 00E6747D
                                        • GetProcAddress.KERNEL32(WTSStartRemoteControlSessionA), ref: 00E6748F
                                        • GetProcAddress.KERNEL32(WTSConnectSessionW), ref: 00E674A1
                                        • GetProcAddress.KERNEL32(WTSConnectSessionA), ref: 00E674B3
                                        • GetProcAddress.KERNEL32(WTSEnumerateServersW), ref: 00E674C5
                                        • GetProcAddress.KERNEL32(WTSEnumerateServersA), ref: 00E674D7
                                        • GetProcAddress.KERNEL32(WTSOpenServerW), ref: 00E674E9
                                        • GetProcAddress.KERNEL32(WTSOpenServerA), ref: 00E674FB
                                        • GetProcAddress.KERNEL32(WTSOpenServerExW), ref: 00E6750D
                                        • GetProcAddress.KERNEL32(WTSOpenServerExA), ref: 00E6751F
                                        • GetProcAddress.KERNEL32(WTSCloseServer), ref: 00E67531
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsW), ref: 00E67543
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsA), ref: 00E67555
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsExW), ref: 00E67567
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsExA), ref: 00E67579
                                        • GetProcAddress.KERNEL32(WTSEnumerateProcessesW), ref: 00E6758B
                                        • GetProcAddress.KERNEL32(WTSEnumerateProcessesA), ref: 00E6759D
                                        • GetProcAddress.KERNEL32(WTSTerminateProcess), ref: 00E675AF
                                        • GetProcAddress.KERNEL32(WTSQuerySessionInformationW), ref: 00E675C1
                                        • GetProcAddress.KERNEL32(WTSQuerySessionInformationA), ref: 00E675D3
                                        • GetProcAddress.KERNEL32(WTSQueryUserConfigW), ref: 00E675E5
                                        • GetProcAddress.KERNEL32(WTSQueryUserConfigA), ref: 00E675F7
                                        • GetProcAddress.KERNEL32(WTSSetUserConfigW), ref: 00E67609
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: WTSCloseServer$WTSConnectSessionA$WTSConnectSessionW$WTSCreateListenerA$WTSCreateListenerW$WTSDisconnectSession$WTSEnableChildSessions$WTSEnumerateListenersA$WTSEnumerateListenersW$WTSEnumerateProcessesA$WTSEnumerateProcessesExA$WTSEnumerateProcessesExW$WTSEnumerateProcessesW$WTSEnumerateServersA$WTSEnumerateServersW$WTSEnumerateSessionsA$WTSEnumerateSessionsExA$WTSEnumerateSessionsExW$WTSEnumerateSessionsW$WTSFreeMemory$WTSFreeMemoryExA$WTSFreeMemoryExW$WTSGetActiveConsoleSessionId$WTSGetChildSessionId$WTSGetListenerSecurityA$WTSGetListenerSecurityW$WTSIsChildSessionsEnabled$WTSLogoffSession$WTSOpenServerA$WTSOpenServerExA$WTSOpenServerExW$WTSOpenServerW$WTSQueryListenerConfigA$WTSQueryListenerConfigW$WTSQuerySessionInformationA$WTSQuerySessionInformationW$WTSQueryUserConfigA$WTSQueryUserConfigW$WTSQueryUserToken$WTSRegisterSessionNotification$WTSRegisterSessionNotificationEx$WTSSendMessageA$WTSSendMessageW$WTSSetListenerSecurityA$WTSSetListenerSecurityW$WTSSetUserConfigA$WTSSetUserConfigW$WTSShutdownSystem$WTSStartRemoteControlSessionA$WTSStartRemoteControlSessionW$WTSStopRemoteControlSession$WTSTerminateProcess$WTSUnRegisterSessionNotification$WTSUnRegisterSessionNotificationEx$WTSVirtualChannelClose$WTSVirtualChannelOpen$WTSVirtualChannelOpenEx$WTSVirtualChannelPurgeInput$WTSVirtualChannelPurgeOutput$WTSVirtualChannelQuery$WTSVirtualChannelRead$WTSVirtualChannelWrite$WTSWaitSystemEvent$wtsapi32.dll
                                        • API String ID: 2238633743-2998606599
                                        • Opcode ID: cbfd39a88a57cef235d23c5f4aafcf0e4644a4edebee276e03d50dcd1e405ca5
                                        • Instruction ID: fee486e95fc928605922c003919cc585b4aa5b86ba68e4a2a80c5daeb6bd1faa
                                        • Opcode Fuzzy Hash: cbfd39a88a57cef235d23c5f4aafcf0e4644a4edebee276e03d50dcd1e405ca5
                                        • Instruction Fuzzy Hash: B7B128B4DC4315AACB396F72BE4A886BEA7E7057703108836ED24563D8D7B580D0EF91
                                        APIs
                                          • Part of subcall function 00E66B05: InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0,00000000,00000000,00000000,?,00E1E59B,00000001,00006060,00000010), ref: 00E66B3E
                                        • GetVersionExA.KERNEL32(?), ref: 00E1E5CD
                                        • GetNativeSystemInfo.KERNEL32(?), ref: 00E1E5E7
                                        • RegOpenKeyExA.ADVAPI32(80000002,Software\FreeRDP\FreeRDP\RemoteFX,00000000,00020119,?), ref: 00E1E612
                                        • primitives_get.GETSCREEN-456311346-X86 ref: 00E1E6DC
                                        • CreateThreadpool.KERNEL32(00000000), ref: 00E1E6E2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CountCreateCriticalInfoInitializeNativeOpenSectionSpinSystemThreadpoolVersionprimitives_get
                                        • String ID: >$Software\FreeRDP\FreeRDP\RemoteFX$com.freerdp.codec.rfx
                                        • API String ID: 3882483829-239130326
                                        • Opcode ID: 5e7a1b8e6a37932735526b49b7b11b5f2518c79ff561ccc9c0b8c5455efa295f
                                        • Instruction ID: 8471738259f5943ad73c17bb4c0d5d0d6096c24287632bf13d9f961d6b74bb51
                                        • Opcode Fuzzy Hash: 5e7a1b8e6a37932735526b49b7b11b5f2518c79ff561ccc9c0b8c5455efa295f
                                        • Instruction Fuzzy Hash: AA41B2B1A00705AFEB149F65EC86BA6B7E8FF44304F10546EF909A6382DB70D984CB50
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E642FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$DecryptMessage: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_DecryptMessage
                                        • API String ID: 689400697-3301108232
                                        • Opcode ID: bb121dd2a6c4b1445a9c346e9f2d6353547500ae03acaba78b371d28ee4eb8b7
                                        • Instruction ID: d27783f75f8fae3bf81d31eeeb2b4232268cea40249480d368e1192d6b219c52
                                        • Opcode Fuzzy Hash: bb121dd2a6c4b1445a9c346e9f2d6353547500ae03acaba78b371d28ee4eb8b7
                                        • Instruction Fuzzy Hash: 3B11AB753C43057BD6256957FD03EAB3EACEBC6BA1F0010A4FA10B52D1DA51CA50DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E643BE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EncryptMessage: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EncryptMessage
                                        • API String ID: 689400697-3976766517
                                        • Opcode ID: 38cece8b4311667905bea5cffd74ccc39b122a2fce3558825a311da355a7c62c
                                        • Instruction ID: 38f5f578feb294e951516538cd509e2b850d336079d7ac3720ee85a5fb7e6117
                                        • Opcode Fuzzy Hash: 38cece8b4311667905bea5cffd74ccc39b122a2fce3558825a311da355a7c62c
                                        • Instruction Fuzzy Hash: B71182763C43057BDA256D56FC03FAB3AACDBC1BA1F0010A4F910B52D1DD61CA50DBA1
                                        APIs
                                        • crypto_cert_fingerprint.GETSCREEN-456311346-X86(?), ref: 00E05E1C
                                          • Part of subcall function 00E0576E: crypto_cert_fingerprint_by_hash.GETSCREEN-456311346-X86(?,sha256), ref: 00E05779
                                        • crypto_cert_issuer.GETSCREEN-456311346-X86(?), ref: 00E05E30
                                        • crypto_cert_subject.GETSCREEN-456311346-X86(?,?), ref: 00E05E3A
                                        • certificate_data_new.GETSCREEN-456311346-X86(?,?,00000000,00000000,00000000,?,?), ref: 00E05E4A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: certificate_data_newcrypto_cert_fingerprintcrypto_cert_fingerprint_by_hashcrypto_cert_issuercrypto_cert_subject
                                        • String ID:
                                        • API String ID: 1865246629-0
                                        • Opcode ID: b22f0af09afbb53f47c67a66392b01df666bde5d5b51faeba4ef9e6157e0229e
                                        • Instruction ID: 30436939fdccf6230c917d8607f5e821c45ada329eadacd6e00ca3c84f9e8d67
                                        • Opcode Fuzzy Hash: b22f0af09afbb53f47c67a66392b01df666bde5d5b51faeba4ef9e6157e0229e
                                        • Instruction Fuzzy Hash: 5EE0DF3A100608BFCF112F29CC05CAF3EEDDF853E4B184126BC0866162DA31CE919AA0
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00EAFDC9,00FDC654), ref: 00EAFCAE
                                        • UnhandledExceptionFilter.KERNEL32(?,?,00EAFDC9,00FDC654), ref: 00EAFCB7
                                        • GetCurrentProcess.KERNEL32(C0000409,?,00EAFDC9,00FDC654), ref: 00EAFCC2
                                        • TerminateProcess.KERNEL32(00000000,?,00EAFDC9,00FDC654), ref: 00EAFCC9
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                        • String ID:
                                        • API String ID: 3231755760-0
                                        • Opcode ID: 37b531d4bad9c99e3e493c117fb2fe0d4ea4a16e887588e7ec16d9b5cc6540bf
                                        • Instruction ID: 9ff56a0e09fc1acf0a7d1d8cec2772f6c4e8bc1237c6560285991fa5fdd50250
                                        • Opcode Fuzzy Hash: 37b531d4bad9c99e3e493c117fb2fe0d4ea4a16e887588e7ec16d9b5cc6540bf
                                        • Instruction Fuzzy Hash: 6BD0CAB2000208AFDB002BE2FD0CB6A3B28AB8861AF050010F31AB20E0CA314448CB61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Genu$OPENSSL_ia32cap$ineI$ntel
                                        • API String ID: 0-3767422159
                                        • Opcode ID: 91d784db3bd27acb256cfd47a56c8b54edd62bdd85b7fd45b2dbe3d973f143bb
                                        • Instruction ID: 1876e8a654550ef9de333c39f3337855e5e0accc89341b703da9d60237783011
                                        • Opcode Fuzzy Hash: 91d784db3bd27acb256cfd47a56c8b54edd62bdd85b7fd45b2dbe3d973f143bb
                                        • Instruction Fuzzy Hash: 4C4118B2F0520E06EF2C557DEE6537E7585FB91374F24423ED616D22C0DA388E508A85
                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00EB62AD
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00EB62B7
                                        • UnhandledExceptionFilter.KERNEL32(37FFFCD7,?,?,?,?,?,?), ref: 00EB62C4
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: 4c33c4e650cc7bb80efe7d9f07a5d6b6217cf2b290c181a6141b79ac8426b160
                                        • Instruction ID: e114b6bc6d9a2071146e8ba25d3adac2b7bd1a228892c46aa7782870bc171925
                                        • Opcode Fuzzy Hash: 4c33c4e650cc7bb80efe7d9f07a5d6b6217cf2b290c181a6141b79ac8426b160
                                        • Instruction Fuzzy Hash: 7A31B37490122C9BCB21DF68D8897DDBBF8BF48314F5051EAE41CB62A0EB749B858F54
                                        APIs
                                        • crypto_cert_subject.GETSCREEN-456311346-X86(?), ref: 00E05B42
                                        • crypto_cert_issuer.GETSCREEN-456311346-X86(?,?), ref: 00E05B4C
                                        • crypto_cert_fingerprint.GETSCREEN-456311346-X86(?,?,?), ref: 00E05B56
                                          • Part of subcall function 00E0576E: crypto_cert_fingerprint_by_hash.GETSCREEN-456311346-X86(?,sha256), ref: 00E05779
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: crypto_cert_fingerprintcrypto_cert_fingerprint_by_hashcrypto_cert_issuercrypto_cert_subject
                                        • String ID:
                                        • API String ID: 727492566-0
                                        • Opcode ID: 1a633657ff4abe09e2177adf77026f771e732b2c21505962873866470fdaa648
                                        • Instruction ID: 48910b6c328a49641b34ab0e59e535dd4d0da18bfcbb485ca7455d56c6af81ea
                                        • Opcode Fuzzy Hash: 1a633657ff4abe09e2177adf77026f771e732b2c21505962873866470fdaa648
                                        • Instruction Fuzzy Hash: DD11C232704B0266FA3896759C46F1B67DC8F507A8F146829FC00FA6C2EA61DDC08A54
                                        APIs
                                        • crypto_cert_fingerprint_by_hash.GETSCREEN-456311346-X86(?,sha256), ref: 00E05779
                                          • Part of subcall function 00E05782: crypto_cert_hash.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,00E0577E,?,sha256), ref: 00E05792
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: crypto_cert_fingerprint_by_hashcrypto_cert_hash
                                        • String ID: sha256
                                        • API String ID: 2885152359-1556616439
                                        • Opcode ID: 23a748550c15128942fffb0715a69dfc55490744b9b1b5dee8070983b9b42aad
                                        • Instruction ID: 4825abbd5848836d58bbb5c2f44ef4dfd7898a108cb3106dcf4cc9b7a38927a5
                                        • Opcode Fuzzy Hash: 23a748550c15128942fffb0715a69dfc55490744b9b1b5dee8070983b9b42aad
                                        • Instruction Fuzzy Hash: 25A0223008830CBBCE003B02CC03C0B3ECC8A00B80B002020B800200A38BA2EA8238C3
                                        APIs
                                        • crypto_base64_encode.GETSCREEN-456311346-X86(00FFA688,00000000,00000000,00000000,00000000,?,00E05E4F,?,?,00000000,00000000,00000000,?,?), ref: 00E13F7D
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: crypto_base64_encode
                                        • String ID:
                                        • API String ID: 2528031924-0
                                        • Opcode ID: f548c7a29598d1732ea2ad95e849a21d244e008be93d6767be3c49e5abff7144
                                        • Instruction ID: 657622900791a633b2ab783c5171bda500abd45230d620d3b9538b3f7cf0fe94
                                        • Opcode Fuzzy Hash: f548c7a29598d1732ea2ad95e849a21d244e008be93d6767be3c49e5abff7144
                                        • Instruction Fuzzy Hash: 2521D672704B029BDB306F79C802EEBB7E9EF08354714642DF985B6292EB31D881CB51
                                        APIs
                                        • crypto_cert_hash.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,00E0577E,?,sha256), ref: 00E05792
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: crypto_cert_hash
                                        • String ID:
                                        • API String ID: 1547982073-0
                                        • Opcode ID: 7460d84a63f73ef57bb7a90a7cbc953c30664581771c6989db31222eff5a1bf8
                                        • Instruction ID: bc45f4b295d7edf56a8896a92c3715f60ebf164e7d40e7175dded6de140286a5
                                        • Opcode Fuzzy Hash: 7460d84a63f73ef57bb7a90a7cbc953c30664581771c6989db31222eff5a1bf8
                                        • Instruction Fuzzy Hash: 0FC04CB601010CBFAB055B85CC46CAB7B6DDA04250B008115B90455011E671AE505AB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: 6f2c8adfc3a7746f7bcc21c7e8ebdf9c9b635e5e3cb3ad753f3208d9ff8683b7
                                        • Instruction ID: 11198f24f183d06352c318b6c8d0d340e81a494698886cf9786b1a91018769cf
                                        • Opcode Fuzzy Hash: 6f2c8adfc3a7746f7bcc21c7e8ebdf9c9b635e5e3cb3ad753f3208d9ff8683b7
                                        • Instruction Fuzzy Hash: F1F089332146087FEF119A99DC46F9F7BACDB417A8F544025F9046A180D771AD40DAA4
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8594b6ab6460f1a920cb8eb264804297f42e7c383dd8a85007c8a27bbb587e5d
                                        • Instruction ID: a2868d3b7eac55d75f812db1b24249b4fe30337a8e30860d8410adeb522d0075
                                        • Opcode Fuzzy Hash: 8594b6ab6460f1a920cb8eb264804297f42e7c383dd8a85007c8a27bbb587e5d
                                        • Instruction Fuzzy Hash: 34E1C365C2DFDA45E323573EA80326BE7647FFB284E50EB1BBDD431C60EB614245A209
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: df5f59882addd6f4a060060eda57f5ea3a47e049d29c4c708cbe6d814f060990
                                        • Instruction ID: cd48955ce6d9497622c37c64d8a5107af82fa5e71597148a8c01a3c0d47ec26f
                                        • Opcode Fuzzy Hash: df5f59882addd6f4a060060eda57f5ea3a47e049d29c4c708cbe6d814f060990
                                        • Instruction Fuzzy Hash: 10A1A021C19B9646E70B3B394443260E330BFF3259B90C716FDA1BA967FB61B6EC5112
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77be462087cbaaea7e44c5ee52357c5fb6e643c5549b2ffd9d324911b1a53615
                                        • Instruction ID: 1ebebbe19a6e11f55b9a42cdc0d8d0ce82f35c7792a7402923930f4ead9791f8
                                        • Opcode Fuzzy Hash: 77be462087cbaaea7e44c5ee52357c5fb6e643c5549b2ffd9d324911b1a53615
                                        • Instruction Fuzzy Hash: 4581BE21918BC586E7128F3C94426EAF3A4FFD6318F10E719EDD4A6152FB31A6C58381
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dfdef36091839f216da07e464d4e15b7867dae8c1b2161ecf9e211a2eda1b7be
                                        • Instruction ID: f8f14d9091f41beddd3cd64663bab78b73c5d9deebbc7f3d54fc35da659c5fc0
                                        • Opcode Fuzzy Hash: dfdef36091839f216da07e464d4e15b7867dae8c1b2161ecf9e211a2eda1b7be
                                        • Instruction Fuzzy Hash: A63104B6A0C2C00ED7198B6C88606A57FE56B9B100B1D84DEE8E9CF343E121DA06E770
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 67c5a5b38ad57acd17395755d6869b213b2472f5960ea1db488aef957251935f
                                        • Instruction ID: e3a3ef7fe6392bf0f85946bf4910803041ca219921d190a17f4aafb6c0ac7af6
                                        • Opcode Fuzzy Hash: 67c5a5b38ad57acd17395755d6869b213b2472f5960ea1db488aef957251935f
                                        • Instruction Fuzzy Hash: 78511372C20F8186E2619B31DD457E3F7E1BFA5304F24972EE4DA21561FBB171E48A81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1bd6ee22b8be88284ea3de3379d93d189bee9a2acde73ad58f94725c0800f69d
                                        • Instruction ID: 21a59a9bf6c0ed250fff62cad35734a63ed0b0456e328006bba04786f2509590
                                        • Opcode Fuzzy Hash: 1bd6ee22b8be88284ea3de3379d93d189bee9a2acde73ad58f94725c0800f69d
                                        • Instruction Fuzzy Hash: CC215024C1CF4941E7136B3CA4432BAA710FFE639AF90D316FCD8B9552FB20464CA11A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 51f477ecbd8c86e18464dd12c1106ff108f6fe7e53e3396059e243e6e9527724
                                        • Instruction ID: 3e4aa2ddb2d8e81c8354a7a9abd9c0855dd406e35942f766b766150b3b172115
                                        • Opcode Fuzzy Hash: 51f477ecbd8c86e18464dd12c1106ff108f6fe7e53e3396059e243e6e9527724
                                        • Instruction Fuzzy Hash: DD1151D9C2AF7A06E713633B5D42242DA105EF7989550D347FCB439D61F701B5C17210
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 626452242-0
                                        • Opcode ID: f0403c5267d148f80ee3574be63082eb3e6e5192dad6b5314b3d77fe67c41ad9
                                        • Instruction ID: a03c14927034ea23175caa07dbe3228bd6f452d4791e7cfd66d787a64ced251f
                                        • Opcode Fuzzy Hash: f0403c5267d148f80ee3574be63082eb3e6e5192dad6b5314b3d77fe67c41ad9
                                        • Instruction Fuzzy Hash: D8011675A0010DABDB08DF99DC519FFB7F9EB8C360F50812AF515A7291E6705905CB60
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 690430d56fe17bedb38f1ad1e72cd64de0a79b14c21557315f9514202e070df0
                                        • Instruction ID: c96f45c71367db845256fd5bfce197966cf2db7d42b3dfea8ad70f6f66b216f1
                                        • Opcode Fuzzy Hash: 690430d56fe17bedb38f1ad1e72cd64de0a79b14c21557315f9514202e070df0
                                        • Instruction Fuzzy Hash: 7BF06272900219ABDF04A7A8C8069BFB7B8EB04314F501469F811A6191EA7099A48A50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a5245e7be1296754392847f4bed58c415fd5748a5bd025052867f57d3d07922
                                        • Instruction ID: 514e0def30770fd7ce6fe467b966567ea1f01b85521439368124ed7635a3685f
                                        • Opcode Fuzzy Hash: 0a5245e7be1296754392847f4bed58c415fd5748a5bd025052867f57d3d07922
                                        • Instruction Fuzzy Hash: 48E09B33100E19E6CB111E09D8415BB7B59EFC1375F185437F904770804731A8C19E91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cfd3501ae8cc7d54b5b6039e73c4159469e4ee806065cc444d8108c8b9717388
                                        • Instruction ID: 4e4482ea48b3984c87557460a1eedc1f3a60f2fd54f69d44ddb1d3e14533ba0f
                                        • Opcode Fuzzy Hash: cfd3501ae8cc7d54b5b6039e73c4159469e4ee806065cc444d8108c8b9717388
                                        • Instruction Fuzzy Hash: 1AE08635B1225F9F8B15CF66C8005AA73E9BF45704354956CDD85EB300D330EC018B80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: abef29f18486b8e7023c2129847a18c3c9cea34ce2d28db27c277d5279c50b60
                                        • Instruction ID: f8981ac4633048896a0dd06339316d672ebf859e785814d58da0b0dbd027a70b
                                        • Opcode Fuzzy Hash: abef29f18486b8e7023c2129847a18c3c9cea34ce2d28db27c277d5279c50b60
                                        • Instruction Fuzzy Hash: F9D05E3265420DABEF05AEE5AC40DBB3B9DEF44628B084498FD2C96551E636EC70E650
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 92904718c7774d80baf37b01db223b482aa12a3400e7c889efefc14f73fae5f7
                                        • Instruction ID: 92a04f9a83b71dba9073c4a63d78b76453f4e7836180bd1ede502346af4ec17a
                                        • Opcode Fuzzy Hash: 92904718c7774d80baf37b01db223b482aa12a3400e7c889efefc14f73fae5f7
                                        • Instruction Fuzzy Hash: 51E0C22B5096A787C320495D90004A7FFA9ADD9698334D5AADEE46B30A8020EA8247F0
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b4a5700dd9c090860e746394635df8148f9f381a8a4f8febb47ad15a4feb3c59
                                        • Instruction ID: a388b622f583c68430d9911c4901e6f0a80875149ec01c4fdf7d15035416a9be
                                        • Opcode Fuzzy Hash: b4a5700dd9c090860e746394635df8148f9f381a8a4f8febb47ad15a4feb3c59
                                        • Instruction Fuzzy Hash: FFD0127261DA3936E93126A9DC03ECB794DCB827B4F501315BC25B52D5E980DE4140E1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 020cacdd8480cb7acb5a33face7ae5f67d8364c27b2bc5f228b0cde8383a0b65
                                        • Instruction ID: dfc734e97ff35bfaa36c523ea258ce03084cdbd240aaa233201dfc112749b66a
                                        • Opcode Fuzzy Hash: 020cacdd8480cb7acb5a33face7ae5f67d8364c27b2bc5f228b0cde8383a0b65
                                        • Instruction Fuzzy Hash: 11D06C3204420DBBCF022EC5DC02AAA3B6AAB08660F448050FB1825562D6B395B1AB95
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dc66a9d30c7db1291679ea8940f3866de8d0a73c04af855de0002ed13e2284d9
                                        • Instruction ID: 02c8e439ce36d90c6a7244436b3d750df7e5e9b4003ac1b95bab6c4b18325f1e
                                        • Opcode Fuzzy Hash: dc66a9d30c7db1291679ea8940f3866de8d0a73c04af855de0002ed13e2284d9
                                        • Instruction Fuzzy Hash: B4D02233102A2E36EA2026D8A802FEB7B4CDB00BB8F004012FE0CAE180DA60880003E1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a874a97c1a0f1350a0a091136a2aa511b6a6aa38adc0722bbc87292597935bc
                                        • Instruction ID: eaa69cea37549275d355d2b768ce8110d3ebab4d0c278a07a58f44241149f78f
                                        • Opcode Fuzzy Hash: 0a874a97c1a0f1350a0a091136a2aa511b6a6aa38adc0722bbc87292597935bc
                                        • Instruction Fuzzy Hash: 95D06C3200420EBBCF025E81CC019AA3F6AAB08350F008010FA10210228A33D571AB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bd6179847572a53a212da4807c37a392a42b3b580a2756777ed8e95ca7690e3a
                                        • Instruction ID: 09f06f083527ad2b413aca9272029d1799b1d1f1e3e43d674593626cba2b1b35
                                        • Opcode Fuzzy Hash: bd6179847572a53a212da4807c37a392a42b3b580a2756777ed8e95ca7690e3a
                                        • Instruction Fuzzy Hash: DDC0123044021D7BEF00F6A4CC0BEBF7AACAB00700F8014107914710D2E670956546A0
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 00697b1b55a066e8f6e82ecc9971366dd5c01e2c0e8b86d5be220022d81dff43
                                        • Instruction ID: b6b49650ccca193b02678548692c94b41543ce7c5104808a0b1ebc836cd973f0
                                        • Opcode Fuzzy Hash: 00697b1b55a066e8f6e82ecc9971366dd5c01e2c0e8b86d5be220022d81dff43
                                        • Instruction Fuzzy Hash: 5BC02B33401238A38D102E48D40089ABB4CEE00BA07044031FC08B71114112AC400AD0
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4b7a3ce230df7e31ab3e725e1e43306e95fe06bef9b56ac6c445c84563359095
                                        • Instruction ID: 3d5d216bcd12a5b2959ab74cf5c014da4c10c4843ebaaec0c24d1a794e811321
                                        • Opcode Fuzzy Hash: 4b7a3ce230df7e31ab3e725e1e43306e95fe06bef9b56ac6c445c84563359095
                                        • Instruction Fuzzy Hash: 11C0127100820CABCF029F90EC018893B6AEF80324B004020FD080A221D63399709B85
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f213a4fa0332fa88bc39a926fb07c1300ecb502a4f432fd2e01db9a1bb9e3ce3
                                        • Instruction ID: c25ef307598847ba6805e7c4d7635c19e5934ab07e89575ccfa8409205877728
                                        • Opcode Fuzzy Hash: f213a4fa0332fa88bc39a926fb07c1300ecb502a4f432fd2e01db9a1bb9e3ce3
                                        • Instruction Fuzzy Hash: B3B0927200C30C2AAD1436A5F80388A3B8DD9806A0B50101AF84855192AD23B59114D9
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5c058d809a171879c7d2e6b30af2b691a972df3c75a096c5f2351ff0c006427d
                                        • Instruction ID: be407e25af17924bbf5c3118ff8c1b3dfda599109e30aad0d69d0a6257322b8e
                                        • Opcode Fuzzy Hash: 5c058d809a171879c7d2e6b30af2b691a972df3c75a096c5f2351ff0c006427d
                                        • Instruction Fuzzy Hash: F5B09231004228BB47226A9AC809C8B7FACEB46AA0B400000BD08872118A20A90596EA
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4a503f68feaf53306e5e090325c103b21fd0aafa9d66652788954b5afafb2aef
                                        • Instruction ID: 9bd994ad1fba45c19eec7a52435106b39782d294e7252f1bc01afe9288928b2a
                                        • Opcode Fuzzy Hash: 4a503f68feaf53306e5e090325c103b21fd0aafa9d66652788954b5afafb2aef
                                        • Instruction Fuzzy Hash: 66C09B648053096ECE00F7F9850A95F7AECAF01700F858414798052143DA789554D7F3
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1147995217c392e36dfc48353d2d3a4c789210a0bcddb43d26d5ef8e713f020
                                        • Instruction ID: 021f060c7b2612bb3391492596c0773debad56d0ace768e35b89cfa63e56300f
                                        • Opcode Fuzzy Hash: c1147995217c392e36dfc48353d2d3a4c789210a0bcddb43d26d5ef8e713f020
                                        • Instruction Fuzzy Hash: 55A0127000020833CD003A66DC0380A398C99022C070010107510510529962A5410499
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a308af3d19b287379fcfdac4b35ebea863e8ea0d915d34481b303974fcc68d7
                                        • Instruction ID: 937af14b68043ccd463d8e4b0a56d43a15b50415cf5a52118659bde69faa8b23
                                        • Opcode Fuzzy Hash: 1a308af3d19b287379fcfdac4b35ebea863e8ea0d915d34481b303974fcc68d7
                                        • Instruction Fuzzy Hash:
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c1af10e55f65fcf33e1f61e2858dedc3d93677e06f0a9ee18408edf0f16553e
                                        • Instruction ID: f9d93bb6050abece768ba640a33519d1f25643404e4c276bdb386cb4d050c773
                                        • Opcode Fuzzy Hash: 3c1af10e55f65fcf33e1f61e2858dedc3d93677e06f0a9ee18408edf0f16553e
                                        • Instruction Fuzzy Hash:
                                        APIs
                                        • freerdp_error_info.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E51519
                                        • freerdp_get_error_info_string.GETSCREEN-456311346-X86(00000000,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E5155D
                                        • freerdp_reconnect.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E51601
                                        • freerdp_get_last_error.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E51611
                                        • Sleep.KERNEL32(0000000A,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E5167E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Sleepfreerdp_error_infofreerdp_get_error_info_stringfreerdp_get_last_errorfreerdp_reconnect
                                        • String ID: Attempting reconnect (%u of %u)$Autoreconnect aborted by user$C:\Project\agent-windows\freerdp\FreeRDP\client\common\client.c$Disconnected by server hitting a bug or resource limit [%s]$Maximum reconnect retries exceeded$Network disconnect!$client_auto_reconnect_ex$com.freerdp.client.common
                                        • API String ID: 968149013-2963753137
                                        • Opcode ID: 3538ab4c8af45b5698131d06b1aa464ba28f8a85c95fba8e602e505131a88645
                                        • Instruction ID: 6bb4cc5dd8fdfe1f4430630b19cf997a96809ee9883e50d1292079a0bd8423f9
                                        • Opcode Fuzzy Hash: 3538ab4c8af45b5698131d06b1aa464ba28f8a85c95fba8e602e505131a88645
                                        • Instruction Fuzzy Hash: 4E513BB174430177EB286A24EC43F6E37A89B56B26F141879FD00FA1C5EAF1CAC88755
                                        APIs
                                        • gdi_get_pixel_format.GETSCREEN-456311346-X86(?,?,?,?,?,00E1A899,?,?,00000000,00000000,Function_006DAA7A), ref: 00E1A8B3
                                        • gdi_free.GETSCREEN-456311346-X86(?,?,?,?,?,00E1A899,?,?,00000000,00000000,Function_006DAA7A), ref: 00E1AA40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: gdi_freegdi_get_pixel_format
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\gdi\gdi.c$com.freerdp.gdi$failed to initialize gdi$gdi_init_ex
                                        • API String ID: 1251975138-534786182
                                        • Opcode ID: 94d5376f375e7f487623b766ad0b037d55404c7b5925ff13d9d5264dc09bfbb3
                                        • Instruction ID: d97876f2b3febf7b13f7770824f00529b975f3a0e68c918c28c89c931717a7b2
                                        • Opcode Fuzzy Hash: 94d5376f375e7f487623b766ad0b037d55404c7b5925ff13d9d5264dc09bfbb3
                                        • Instruction Fuzzy Hash: B741B5B1200701AFD715AF34DC42BA977E5FF44310F189439F998A6292EF71A990DB51
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00DE0F64
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00DE0F79
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID: ,$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\client.c$PDRF$Skipping, channel already loaded$com.freerdp.core.client$error: channel export function call failed$error: too many channels$freerdp_channels_client_load_ex
                                        • API String ID: 3168844106-1571615648
                                        • Opcode ID: d65ecbbbdc760c3928f7bd766125d18708d5077ee84f4854461471854b8938c0
                                        • Instruction ID: d2f08f00a7c610a919212df012d5e40fe021061c490d5a876014d611b475af51
                                        • Opcode Fuzzy Hash: d65ecbbbdc760c3928f7bd766125d18708d5077ee84f4854461471854b8938c0
                                        • Instruction Fuzzy Hash: AC41B571A44306ABEB18EF6ADC42F997BE4EF08714F144429F614F7280D7B0E984DBA5
                                        APIs
                                        • freerdp_settings_free.GETSCREEN-456311346-X86(00000000), ref: 00DE7326
                                          • Part of subcall function 00DE7F9B: GetComputerNameExA.KERNEL32(00000000,?,?,00000000), ref: 00DE7FCC
                                          • Part of subcall function 00DE7F9B: freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000680,?), ref: 00DE7FFC
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(00000000,00000086,?), ref: 00DE6D8C
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(00000000,00001446,00000001), ref: 00DE7177
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(00000000,00001447,00000003), ref: 00DE718F
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(00000000,00001448,00000005), ref: 00DE71A7
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(00000000,00001449,00000002), ref: 00DE71BF
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(00000000,0000144A,00002328), ref: 00DE71DA
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(00000000,0000144D,00003A98), ref: 00DE71F5
                                        Strings
                                        • C:\Windows\System32\mstscax.dll, xrefs: 00DE6F3F
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_uint32$freerdp_settings_set_string$ComputerNamefreerdp_settings_freefreerdp_settings_set_bool
                                        • String ID: C:\Windows\System32\mstscax.dll
                                        • API String ID: 2536960967-183970058
                                        • Opcode ID: e6ebf67ac6e9837b8ae8192c64529a83496699c17512e2b925f6d754e112a130
                                        • Instruction ID: 91ceafb141c1250de94930b378e50f44a5a873b2c0478d487d6cdc88cc37dd32
                                        • Opcode Fuzzy Hash: e6ebf67ac6e9837b8ae8192c64529a83496699c17512e2b925f6d754e112a130
                                        • Instruction Fuzzy Hash: 0A1209B1904F409EE324DF39D885B93B7E4FF08311F54892EE5AE87291EBB1A540CB58
                                        APIs
                                        • freerdp_device_collection_add.GETSCREEN-456311346-X86(?,?), ref: 00E56D79
                                        • freerdp_device_collection_add.GETSCREEN-456311346-X86(?,00000000), ref: 00E56E1D
                                        • freerdp_device_collection_add.GETSCREEN-456311346-X86(?,00000000), ref: 00E56F6F
                                        • freerdp_device_collection_add.GETSCREEN-456311346-X86(?,00000000), ref: 00E57044
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_device_collection_add
                                        • String ID: drive$parallel$printer$serial$smartcard
                                        • API String ID: 2538329621-807955808
                                        • Opcode ID: ffc6a7c52f6a03e8bbebe9808ce329b2e120046787e2d3026db46938ee24f6f8
                                        • Instruction ID: 7f2c20b793b24d864cb934cebe15943cd125216390601609ab6eb8c8c0cb3d40
                                        • Opcode Fuzzy Hash: ffc6a7c52f6a03e8bbebe9808ce329b2e120046787e2d3026db46938ee24f6f8
                                        • Instruction Fuzzy Hash: 77B1C1327086029BDF15AF18D841AAEBBF1EF04315B149869FC047F252EF72DD569B90
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00DE0D92
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00DE0DB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\client.c$PDRF$Skipping, channel already loaded$com.freerdp.core.client$error: channel export function call failed$error: too many channels$freerdp_channels_client_load
                                        • API String ID: 3168844106-4217659166
                                        • Opcode ID: f4b9a4b7bef36f58fb92813e6c76901a1e0d39af9f84771925da2d5baa197c89
                                        • Instruction ID: a8ffc478e93433c56363ebd0809311dbf1290ac6cbef7cee11183f1aa01613d3
                                        • Opcode Fuzzy Hash: f4b9a4b7bef36f58fb92813e6c76901a1e0d39af9f84771925da2d5baa197c89
                                        • Instruction Fuzzy Hash: 9451F571A00305BFEB28EF66DC42F597BE4EB44714F144429FA04BB280D7B0E984CB65
                                        APIs
                                        • audio_format_get_tag_string.GETSCREEN-456311346-X86(00000000,?,?,00EE5425,?,?,?,?,00000000,?), ref: 00EE58FA
                                        • audio_format_get_tag_string.GETSCREEN-456311346-X86(00000001,00000000,?,?,00EE5425,?,?,?,?,00000000,?), ref: 00EE5902
                                        • audio_format_compatible.GETSCREEN-456311346-X86(%T,?,?,?,?,00EE5425,?,?,?,?,00000000,?), ref: 00EE594D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: audio_format_get_tag_string$audio_format_compatible
                                        • String ID: %T$%s requires %s for sample input, got %s$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\dsp.c$Missing resample support, recompile -DWITH_SOXR=ON or -DWITH_DSP_FFMPEG=ON$com.freerdp.dsp$freerdp_dsp_resample
                                        • API String ID: 204136587-1473788660
                                        • Opcode ID: 0175b240b89b012f499e3555ad95aaac50268f4ad9114bdfc14134cd03db4bfd
                                        • Instruction ID: 4a4ef30bb2a282b721556808073cd017f09725296a4d6e4116276049ede42635
                                        • Opcode Fuzzy Hash: 0175b240b89b012f499e3555ad95aaac50268f4ad9114bdfc14134cd03db4bfd
                                        • Instruction Fuzzy Hash: B121DBB364434D79E7286E79AC43F7633D88F4072CF10141AFA14FA1C1ED51E9945269
                                        APIs
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,00000400,00000001), ref: 00EE3B87
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000401,00000000), ref: 00EE3BB7
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000404,?), ref: 00EE3BDB
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000402,00000000), ref: 00EE3BFA
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000014,?), ref: 00EE3C12
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,000006C1,?), ref: 00EE3C2B
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000403,?), ref: 00EE3C44
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000015,00000000), ref: 00EE3C60
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(?,00000013,?), ref: 00EE3C82
                                        • freerdp_target_net_addresses_free.GETSCREEN-456311346-X86(?), ref: 00EE3C93
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_string$freerdp_settings_set_boolfreerdp_settings_set_uint32freerdp_target_net_addresses_free
                                        • String ID:
                                        • API String ID: 949014189-0
                                        • Opcode ID: 6cef6dd10707ff90aaa457e2c58685527288738f0f1d639d76a365eb69d9ad72
                                        • Instruction ID: ee3e00af7058056034ea48b4a9856d08492dab3e454d3697af5981f1cbaf7a28
                                        • Opcode Fuzzy Hash: 6cef6dd10707ff90aaa457e2c58685527288738f0f1d639d76a365eb69d9ad72
                                        • Instruction Fuzzy Hash: 1B41C471600A0EBBE7315F36DC49FA6B3A4FF04308F055025FB05A7691E772EA61CAA5
                                        APIs
                                          • Part of subcall function 00E65CD5: InitializeCriticalSectionAndSpinCount.KERNEL32(00000004,00000FA0,?,00000000,?,00E91701,00000001), ref: 00E65CF9
                                        • zgfx_context_new.GETSCREEN-456311346-X86(00000000), ref: 00E91874
                                          • Part of subcall function 00EE693A: zgfx_context_reset.GETSCREEN-456311346-X86(00000000,00000000,00000000,?,00E91879,00000000), ref: 00EE6964
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpinzgfx_context_newzgfx_context_reset
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\channels\rdpgfx\client\rdpgfx_main.c$Failed to acquire reference to WLog %s$HashTable_New failed!$calloc failed!$com.freerdp.channels.rdpgfx.client$rdpgfx_client_context_new$zgfx_context_new failed!
                                        • API String ID: 3732774510-3243565116
                                        • Opcode ID: 44fd1ff1059481c35aaa57afcd9f5083c3bf69db948f990d5f38052d1c133aa5
                                        • Instruction ID: cdd02681824d817a9daabc36933c41336aa1e1c5c0caf96ea34efa4d55add886
                                        • Opcode Fuzzy Hash: 44fd1ff1059481c35aaa57afcd9f5083c3bf69db948f990d5f38052d1c133aa5
                                        • Instruction Fuzzy Hash: 5C7113B1684B026AE7389F259C42F5673E4EB65724F14247AF514BBBC1EBB0E8408B85
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_APPENDER,00000000,00000000), ref: 00E5E8B2
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_APPENDER,00000000,00000000), ref: 00E5E8D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: %s environment variable modified in my back$BINARY$CONSOLE$FILE$UDP$WLOG_APPENDER
                                        • API String ID: 1431749950-225596728
                                        • Opcode ID: f85af800ea29ef647aaaba071afc52dc505f89f6ea6a7e5a7edd4f3200ae4380
                                        • Instruction ID: eea6bceb37ef318e3e9be291d048de48015d88e030ad280cafb9e0c9c563427c
                                        • Opcode Fuzzy Hash: f85af800ea29ef647aaaba071afc52dc505f89f6ea6a7e5a7edd4f3200ae4380
                                        • Instruction Fuzzy Hash: 02214D3324435628A66C32626C47EFB17DCCBC1735720283EFC04F52C1EE54D9449572
                                        APIs
                                        • freerdp_set_last_error_ex.GETSCREEN-456311346-X86(?,?,rdp_set_error_info,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c,0000015B), ref: 00DE48D9
                                        • freerdp_set_last_error_ex.GETSCREEN-456311346-X86(?,00000000,rdp_set_error_info,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c,0000016A), ref: 00DE498F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_set_last_error_ex
                                        • String ID: %s missing context=%p$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c$ErrorInfo$com.freerdp.core.rdp$freerdp$rdp_set_error_info
                                        • API String ID: 270715978-29603548
                                        • Opcode ID: 5d29f7c4fff7084d2cf1709e9ddddcc5051b767ce08feb2d24e94f6adf9d6fe4
                                        • Instruction ID: 8170e51bf97e31097f98c6e0293c3d2ca9c5818593e8b27ae0eeec0b3a372e4a
                                        • Opcode Fuzzy Hash: 5d29f7c4fff7084d2cf1709e9ddddcc5051b767ce08feb2d24e94f6adf9d6fe4
                                        • Instruction Fuzzy Hash: 1021DB72A40301B6EB107B55DC42FEB7BA89B55B10F14406AFE187A2C2E7F0D640DEB6
                                        APIs
                                        • LoadLibraryA.KERNEL32(secur32.dll,?,00E64AEC), ref: 00E64B18
                                        • LoadLibraryA.KERNEL32(security.dll,?,00E64AEC), ref: 00E64B28
                                        • GetProcAddress.KERNEL32(00000000,InitSecurityInterfaceW), ref: 00E64B42
                                        • GetProcAddress.KERNEL32(InitSecurityInterfaceA), ref: 00E64B51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: InitSecurityInterfaceA$InitSecurityInterfaceW$secur32.dll$security.dll
                                        • API String ID: 2574300362-4081094439
                                        • Opcode ID: f574d7fb1100db4f06bb4a4364dd2dac3b00fac38762a0bc4807e1416320d498
                                        • Instruction ID: 2467c9e3237dd056bababc375fa8cf4798c3c3f533fae5c779a758c63ed3ffad
                                        • Opcode Fuzzy Hash: f574d7fb1100db4f06bb4a4364dd2dac3b00fac38762a0bc4807e1416320d498
                                        • Instruction Fuzzy Hash: 8CF089B6D547265A8B35ABBAFC0095B7AE8ABC57943060173D810E33C4EA70C8418FA1
                                        APIs
                                        • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00E14320
                                        • GetFileSize.KERNEL32(00000000,?), ref: 00E1433A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: File$CreateSize
                                        • String ID: %s %hu %s %s %s
                                        • API String ID: 2791376181-2916857029
                                        • Opcode ID: e1f4d0db821e81ccb62981d84f075aaed891f70791014b362a4df11e68f78d93
                                        • Instruction ID: acdf8f9519bb965fdd7aa53992615acb50d7e7de6788884712e359d10878b077
                                        • Opcode Fuzzy Hash: e1f4d0db821e81ccb62981d84f075aaed891f70791014b362a4df11e68f78d93
                                        • Instruction Fuzzy Hash: 46514DF2900215AFEB159BA4EC45AFFB7FCEF05724B10512AF911F6281EB309A408B61
                                        APIs
                                        • ber_read_universal_tag.GETSCREEN-456311346-X86(?,00000002,00000000), ref: 00DF502A
                                        • ber_read_length.GETSCREEN-456311346-X86(?,?), ref: 00DF503F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ber_read_lengthber_read_universal_tag
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\crypto\ber.c$ber_read_integer$com.freerdp.crypto$should implement reading an 8 bytes integer$should implement reading an integer with length=%d
                                        • API String ID: 3186670568-2454464461
                                        • Opcode ID: 36734cb21570665edcef819790e90f43234d63eec15ae6d0bc07f47e677e46ab
                                        • Instruction ID: 124a32fcb6c68544196f44fcc3d1fca5e374739040c6fbd40d6ed899f8758019
                                        • Opcode Fuzzy Hash: 36734cb21570665edcef819790e90f43234d63eec15ae6d0bc07f47e677e46ab
                                        • Instruction Fuzzy Hash: 04417BB1704B055BEB248E24EC82B3A37E59B93711F19C165FB94DA28DE634E900CB75
                                        APIs
                                        • region16_rects.GETSCREEN-456311346-X86(?,?), ref: 00E39C6E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: region16_rects
                                        • String ID: (%hu,%hu-%hu,%hu)$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\region.c$band %d: $com.freerdp.codec$nrects=%u$region16_print
                                        • API String ID: 844131241-2640574824
                                        • Opcode ID: 7bf2d74381e6accf357584660bc0956c7f8f6c89781f695cbcdbc9d0514b13f6
                                        • Instruction ID: 8a66054ec58b55bc3ba9c7fc81c24ee0315ce0081eab7a36f20c4ed4629b2044
                                        • Opcode Fuzzy Hash: 7bf2d74381e6accf357584660bc0956c7f8f6c89781f695cbcdbc9d0514b13f6
                                        • Instruction Fuzzy Hash: B73138B2780301B9FA38A664BD83F767AD8AB55B11F101425F910F61C1FBD2DE80D365
                                        APIs
                                        • freerdp_set_last_error_ex.GETSCREEN-456311346-X86(?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00DD2C14
                                        • clearChannelError.GETSCREEN-456311346-X86(?,?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00DD2C1B
                                          • Part of subcall function 00DD26E1: ResetEvent.KERNEL32(?), ref: 00DD270A
                                          • Part of subcall function 00DE8142: ResetEvent.KERNEL32(?,?,00DD2C27,?,?,?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00DE814E
                                        Strings
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c, xrefs: 00DD2BFC
                                        • freerdp_connect, xrefs: 00DD2C01
                                        • freerdp, xrefs: 00DD3062
                                        • ConnectionResult, xrefs: 00DD3077
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EventReset$ChannelErrorclearfreerdp_set_last_error_ex
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c$ConnectionResult$freerdp$freerdp_connect
                                        • API String ID: 3632380314-3564821047
                                        • Opcode ID: 76027c8eb997f629d7c0d68c039c977b8a9f29a580b31835790cd318af089771
                                        • Instruction ID: 3da5c172900fc525c1e53ea94368d21cbe64efe708281ebf4b1b7bed3b3c4932
                                        • Opcode Fuzzy Hash: 76027c8eb997f629d7c0d68c039c977b8a9f29a580b31835790cd318af089771
                                        • Instruction Fuzzy Hash: 3C319070600205AFE714EF79D885BAAB7E4FF18310F18007AE814EB395EB71DD548B61
                                        APIs
                                        • ber_write_universal_tag.GETSCREEN-456311346-X86(?,00000002,00000000), ref: 00DF5415
                                        • ber_write_length.GETSCREEN-456311346-X86(?,00000001,?,00000002,00000000), ref: 00DF541D
                                        • ber_write_universal_tag.GETSCREEN-456311346-X86(?,00000002,00000000), ref: 00DF5440
                                        • ber_write_length.GETSCREEN-456311346-X86(?,00000002,?,00000002,00000000), ref: 00DF5448
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ber_write_lengthber_write_universal_tag
                                        • String ID:
                                        • API String ID: 1889070510-0
                                        • Opcode ID: 18ef3f9f5ae11241768caf1c4dc31a824dec3e3bd5586f49f269dacf6024e569
                                        • Instruction ID: 461baeccb03d8eab8afe0d870c592d00a69c3dddf3abcf7b05a2a087f50e117f
                                        • Opcode Fuzzy Hash: 18ef3f9f5ae11241768caf1c4dc31a824dec3e3bd5586f49f269dacf6024e569
                                        • Instruction Fuzzy Hash: 0821C531105F48AFDB126F04ED42B7A77A5EF11B01F06C459FB8A5FB86C261AA41CBB1
                                        APIs
                                        • glyph_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCB79
                                        • brush_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCB86
                                        • pointer_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCB94
                                        • bitmap_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCBA2
                                        • offscreen_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCBB0
                                        • palette_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCBBE
                                        • nine_grid_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCBCC
                                        • cache_free.GETSCREEN-456311346-X86(00000000), ref: 00DFCBDE
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: bitmap_cache_newbrush_cache_newcache_freeglyph_cache_newnine_grid_cache_newoffscreen_cache_newpalette_cache_newpointer_cache_new
                                        • String ID:
                                        • API String ID: 2332728789-0
                                        • Opcode ID: 42906154869710506a0c67ebba1e6bbb42983877cc0118c6e46d3c0bd67e0258
                                        • Instruction ID: b0ffd07b9bf7b51cbda64cc5f1151c4f790637e4843397a8b2905ebc05afc5ae
                                        • Opcode Fuzzy Hash: 42906154869710506a0c67ebba1e6bbb42983877cc0118c6e46d3c0bd67e0258
                                        • Instruction Fuzzy Hash: CD01083A154B0F5AE3246B759902D3B73E8CF4277071A943EE684E5981FF20D4018271
                                        APIs
                                        • region16_init.GETSCREEN-456311346-X86(?), ref: 00E1F58A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: region16_init
                                        • String ID:
                                        • API String ID: 4140821900-0
                                        • Opcode ID: 3e8d829aa97f6b1ed1f2f2cf94f42bc771981313d169c183af5fd76dbc63c424
                                        • Instruction ID: ec1014923d3b5b3e80ed01098ad254f45aa481fb1460d3c00954727d1ab1e09e
                                        • Opcode Fuzzy Hash: 3e8d829aa97f6b1ed1f2f2cf94f42bc771981313d169c183af5fd76dbc63c424
                                        • Instruction Fuzzy Hash: 63515CB2D00219ABCB18DFA5C8859EEBBF9FF48304F10452AF519E7241E7359985CBA0
                                        APIs
                                        • gdi_CreateCompatibleDC.GETSCREEN-456311346-X86(?,00000000,?,?,?,00E1A9C7,00000000,?,?,?,?,?,?,?,?,00E1A899), ref: 00E1AAE7
                                        • gdi_CreateCompatibleBitmap.GETSCREEN-456311346-X86(?,?,?,00000000,?,?,?,00E1A9C7,00000000,?,?,?,?), ref: 00E1AB0E
                                        • gdi_CreateBitmapEx.GETSCREEN-456311346-X86(?,?,?,?,?,?,00000000,?,?,?,00E1A9C7,00000000,?,?,?,?), ref: 00E1AB2A
                                        • gdi_SelectObject.GETSCREEN-456311346-X86(?,?), ref: 00E1AB60
                                        • gdi_CreateRectRgn.GETSCREEN-456311346-X86(00000000,00000000,00000000,00000000), ref: 00E1ABA5
                                        • gdi_DeleteObject.GETSCREEN-456311346-X86(?), ref: 00E1AC39
                                        • gdi_DeleteDC.GETSCREEN-456311346-X86(?), ref: 00E1AC48
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: gdi_$Create$BitmapCompatibleDeleteObject$RectSelect
                                        • String ID:
                                        • API String ID: 412453062-0
                                        • Opcode ID: 465b4ffd023e57f5a0c4565455c46a70f3e764856c2752f7a876167ddfb1c273
                                        • Instruction ID: 369f836486f398dc17a43ec8dc3e549d9d734985e0e36e381b35e0ae2a0db17b
                                        • Opcode Fuzzy Hash: 465b4ffd023e57f5a0c4565455c46a70f3e764856c2752f7a876167ddfb1c273
                                        • Instruction Fuzzy Hash: B451F4752007059FC725DF28D885EA6BBE1FF18310B0945BDE98A9BB62E771E881CF40
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_PATH,00000000,00000000,00000000,?,?,?,?,?,00E66939,?,?,?,?,00E66A0A,?), ref: 00E6EABD
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_PATH,00000000,?,?,?,?,00E66939,?,?,?,?,00E66A0A,?,?,00000000), ref: 00E6EAE7
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_NAME,00000000,00000000,?,?,?,00E66939,?,?,?,?,00E66A0A,?,?,00000000), ref: 00E6EB14
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_NAME,00000000,?,?,?,?,00E66939,?,?,?,?,00E66A0A,?,?,00000000), ref: 00E6EB37
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WLOG_FILEAPPENDER_OUTPUT_FILE_NAME$WLOG_FILEAPPENDER_OUTPUT_FILE_PATH
                                        • API String ID: 1431749950-2760771567
                                        • Opcode ID: 93120bc9b1138ba60fa773353da50025a807c0c047b7c4127d4b60b8973ff944
                                        • Instruction ID: 44ed949daa29eaaac9d7c7c8cd28db9a70504ab149fa2f3aff69463943978188
                                        • Opcode Fuzzy Hash: 93120bc9b1138ba60fa773353da50025a807c0c047b7c4127d4b60b8973ff944
                                        • Instruction Fuzzy Hash: 8331D67AA40A167F87245BA5B94AE6FBFA8FB807E83101018F805B37C0DB709C14C7E1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(01091278,Function_00068C90,00858EC0,00000000), ref: 00858F0A
                                        • GetLastError.KERNEL32 ref: 00858F38
                                        • TlsGetValue.KERNEL32 ref: 00858F46
                                        • SetLastError.KERNEL32(00000000), ref: 00858F4F
                                        • RtlAcquireSRWLockExclusive.NTDLL(01091284), ref: 00858F61
                                        • RtlReleaseSRWLockExclusive.NTDLL(01091284), ref: 00858F73
                                        • TlsSetValue.KERNEL32(00000000,?,?,00000000,0083B080), ref: 00858FB5
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorExclusiveLastLockOnceValue$AcquireExecuteInitRelease
                                        • String ID:
                                        • API String ID: 389898287-0
                                        • Opcode ID: f04c0405189396b733ced8dce6bee808b36de17b08bff353e8eee60779ed62f8
                                        • Instruction ID: 88c9c2763f0b6e316ddacb0b7219a999e44428b107d711f0667b0adb175d5a32
                                        • Opcode Fuzzy Hash: f04c0405189396b733ced8dce6bee808b36de17b08bff353e8eee60779ed62f8
                                        • Instruction Fuzzy Hash: CC21DEB1700209AFDB106FA5AC09BBF7BA5FB48712F000065FD15F6290DF329918CBA1
                                        APIs
                                        • socket.WS2_32(00000002,00000002,00000011), ref: 00E6F673
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_UDP_TARGET,00000000,00000000,?,00E66921,?,?,?,?,00E66A0A,?,?,00000000,?,00E5E976,00000000), ref: 00E6F68A
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_UDP_TARGET,00000000,00000000,?,00E66921,?,?,?,?,00E66A0A,?,?,00000000,?,00E5E976,00000000), ref: 00E6F6AB
                                        • closesocket.WS2_32(?), ref: 00E6F6E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable$closesocketsocket
                                        • String ID: 127.0.0.1:20000$WLOG_UDP_TARGET
                                        • API String ID: 65193492-3368084233
                                        • Opcode ID: c72a25afce93f4f694471f3ee6bd091967ec1fa3b19ec3d12373a4563b583b32
                                        • Instruction ID: bc85d5087c005b3fbee902f9629bdd3e8aaf7fc946189b9df31ee51d6bd9174e
                                        • Opcode Fuzzy Hash: c72a25afce93f4f694471f3ee6bd091967ec1fa3b19ec3d12373a4563b583b32
                                        • Instruction Fuzzy Hash: 3321A772285B025FD3245F65FC0AB6B7BE4EF80798F20252DF142BA5E1DBB198058794
                                        APIs
                                        • LoadLibraryA.KERNEL32(winsta.dll,?,00E678D9,01117120), ref: 00E70023
                                        • GetProcAddress.KERNEL32(00000000,WinStationVirtualOpen), ref: 00E7003C
                                        • GetProcAddress.KERNEL32(WinStationVirtualOpenEx), ref: 00E70052
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: WinStationVirtualOpen$WinStationVirtualOpenEx$winsta.dll
                                        • API String ID: 2238633743-2382846951
                                        • Opcode ID: 2cfa2f29dbd65787d45f2b744bd5528e8526f62ae58ad412d53d2748a78ab3b0
                                        • Instruction ID: 32b69e39702407b941c3bfaac5da665eb4171438ab034fe819b961ba58f201de
                                        • Opcode Fuzzy Hash: 2cfa2f29dbd65787d45f2b744bd5528e8526f62ae58ad412d53d2748a78ab3b0
                                        • Instruction Fuzzy Hash: 69015AB0502345DFC7149FB1A90FF623BE4AB84368F05A4B9E40DEB2A2EBB08454DF10
                                        APIs
                                        • glyph_cache_free.GETSCREEN-456311346-X86(?), ref: 00DFCB1E
                                        • brush_cache_free.GETSCREEN-456311346-X86(?,?), ref: 00DFCB26
                                        • pointer_cache_free.GETSCREEN-456311346-X86(?,?,?), ref: 00DFCB2E
                                        • bitmap_cache_free.GETSCREEN-456311346-X86(?,?,?,?), ref: 00DFCB36
                                        • offscreen_cache_free.GETSCREEN-456311346-X86(?,?,?,?,?), ref: 00DFCB3E
                                        • palette_cache_free.GETSCREEN-456311346-X86(?,?,?,?,?,?), ref: 00DFCB46
                                        • nine_grid_cache_free.GETSCREEN-456311346-X86(?,?,?,?,?,?,?), ref: 00DFCB4E
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: bitmap_cache_freebrush_cache_freeglyph_cache_freenine_grid_cache_freeoffscreen_cache_freepalette_cache_freepointer_cache_free
                                        • String ID:
                                        • API String ID: 637575458-0
                                        • Opcode ID: 2a12e379a9b476aac062f53d4a627af9393f4fd168afc1b96a522a904cabb56b
                                        • Instruction ID: 83de3c3d88fed34b4be5f7147f8d4e85688abd036436b9d609a446bc8799a7fd
                                        • Opcode Fuzzy Hash: 2a12e379a9b476aac062f53d4a627af9393f4fd168afc1b96a522a904cabb56b
                                        • Instruction Fuzzy Hash: 07E09B31001A18BBCA313F11DC03C6ABBE5EF007503019434F55631473CB12AC605EB0
                                        APIs
                                        • gdi_CRgnToRect.GETSCREEN-456311346-X86(00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00E3E040
                                        • gdi_RgnToRect.GETSCREEN-456311346-X86(?,?,?,?,?), ref: 00E3E04F
                                        • gdi_CRgnToRect.GETSCREEN-456311346-X86(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00E3E062
                                        • gdi_RgnToRect.GETSCREEN-456311346-X86(?,?,?,?,?), ref: 00E3E0A3
                                        • gdi_CRgnToRect.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?,?,?), ref: 00E3E0C8
                                        • gdi_RectToCRgn.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E3E147
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Rectgdi_
                                        • String ID:
                                        • API String ID: 2404991910-0
                                        • Opcode ID: 8592d4b9fc954a23c51d8089cfdd8034bbc253bc9ee9e6b6720c46bce5647996
                                        • Instruction ID: 96b8cc727f8e17f1b6ea72f0ea41667d137aa4c0e79bf67c46f0b7f01a2219bd
                                        • Opcode Fuzzy Hash: 8592d4b9fc954a23c51d8089cfdd8034bbc253bc9ee9e6b6720c46bce5647996
                                        • Instruction Fuzzy Hash: 2251BF72E01219AFCF14CF98C8858EEBBB9FF48710F24506AE515B7290D770AA41CFA0
                                        APIs
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(?,000007C0,?), ref: 00E11DA2
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C8,00000001), ref: 00E11DCC
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C8,00000000), ref: 00E11DE8
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C9,00000000), ref: 00E11DFC
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C8,00000000), ref: 00E11E19
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C9,00000000), ref: 00E11E2D
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_bool$freerdp_settings_set_uint32
                                        • String ID:
                                        • API String ID: 4272850885-0
                                        • Opcode ID: fad6795779e0600882673a89c48fb156f3d83e8e8ab2019e83a44d2ff3258703
                                        • Instruction ID: f8763289a3bf4df7cbc9b193118eddb648a5e4de0918d08b4ad2652c0c54611b
                                        • Opcode Fuzzy Hash: fad6795779e0600882673a89c48fb156f3d83e8e8ab2019e83a44d2ff3258703
                                        • Instruction Fuzzy Hash: 16112672F9A20675F96020A81C82FFF129C8F62B59F151065FF0CB50C5E982AE8084F6
                                        APIs
                                        • freerdp_image_copy.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?,08008000,00000000,00000000,00000000,?,00000001,?,?), ref: 00E38C2B
                                        Strings
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c, xrefs: 00E38DBF
                                        • 1bpp and 4bpp icons are not supported, xrefs: 00E38DB5
                                        • com.freerdp.color, xrefs: 00E38D98
                                        • freerdp_image_copy_from_icon_data, xrefs: 00E38DBA
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_image_copy
                                        • String ID: 1bpp and 4bpp icons are not supported$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c$com.freerdp.color$freerdp_image_copy_from_icon_data
                                        • API String ID: 1523062921-332027372
                                        • Opcode ID: 4a5f587daec7b34b851bae1ff9aff2286c695329c362d47b281588827c0c52a9
                                        • Instruction ID: e10dace457dbc59b489e8bb08a4631d7855c66db3ed35d632b19499e7502cb47
                                        • Opcode Fuzzy Hash: 4a5f587daec7b34b851bae1ff9aff2286c695329c362d47b281588827c0c52a9
                                        • Instruction Fuzzy Hash: D351E5B2A00219AADF249F14CD55BFA7BE8EF48304F4491A9FD14B61C1D7708E84CF64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: kbd-lang-list$kbd-list$monitor-list
                                        • API String ID: 0-1393584692
                                        • Opcode ID: fc779237b4336a214705d587833e9466341407683a80dca062985e0ea7bc20c9
                                        • Instruction ID: cf26dd922f8dd5a1544b94847bd4e3c538c367ce0be8ac9e0d21ada9283cf3e8
                                        • Opcode Fuzzy Hash: fc779237b4336a214705d587833e9466341407683a80dca062985e0ea7bc20c9
                                        • Instruction Fuzzy Hash: 97312632941218ABCB20EB68DE46DCBB7E8EB04364F0415A5FD58F31D2DA70DE44DAE1
                                        Strings
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\interleaved.c, xrefs: 00E29AFA
                                        • com.freerdp.codec, xrefs: 00E29AD0
                                        • interleaved_compress: width (%u) or height (%u) is greater than 64, xrefs: 00E29AF0
                                        • interleaved_compress, xrefs: 00E29AF5
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\interleaved.c$com.freerdp.codec$interleaved_compress$interleaved_compress: width (%u) or height (%u) is greater than 64
                                        • API String ID: 0-4054760794
                                        • Opcode ID: 2c3025f007e12810780489261eebf05877b05e840c482a44d70caa2ec03b9755
                                        • Instruction ID: d0b0ef4ff29df0d69cbf4a7b01aa762c29b214c73deb56f7aa6d848dfbc90aac
                                        • Opcode Fuzzy Hash: 2c3025f007e12810780489261eebf05877b05e840c482a44d70caa2ec03b9755
                                        • Instruction Fuzzy Hash: D421C5B2300318BFEF255E65FC46FAB3B99EB04758F082125F904B6192E671EC50DB50
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63DA3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$InitializeSecurityContextA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_InitializeSecurityContextA
                                        • API String ID: 689400697-1744466472
                                        • Opcode ID: b43d27a02e64b3855bd2d00826af0e9573d7b4891491f7309508452aceefcf4a
                                        • Instruction ID: 2dde4162ece75e4f1ceea61cf6cb4366d1377af0db38541cc54b562353e5180f
                                        • Opcode Fuzzy Hash: b43d27a02e64b3855bd2d00826af0e9573d7b4891491f7309508452aceefcf4a
                                        • Instruction Fuzzy Hash: C621AB362843047BDF251E56FD02DEB3FADEB85B50F041094FE04751E1D662CA60EB61
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63CC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$InitializeSecurityContextW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_InitializeSecurityContextW
                                        • API String ID: 689400697-743139187
                                        • Opcode ID: b2575a477b341063c303193b3a61ffe40f44a93fcd204d4dde4e0c48b6fc6ee7
                                        • Instruction ID: dd70e3b80e20591b70383b4616a6ea383e8ba3d2355b1c5651964a003139d43d
                                        • Opcode Fuzzy Hash: b2575a477b341063c303193b3a61ffe40f44a93fcd204d4dde4e0c48b6fc6ee7
                                        • Instruction Fuzzy Hash: C121DB722C03047BDF155E56EC03EEB3FA9EF95B94F041054FA00751D1D662DA60EBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6384E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcceptSecurityContext: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcceptSecurityContext
                                        • API String ID: 689400697-2008077614
                                        • Opcode ID: 02151954d58329d9bf924ee8393493ca76bf5563b245eaae9e46fdaef9fbba2e
                                        • Instruction ID: 9c60d91e23d7eeb7162c19f23a6d2930e8d653f597869ff6df667cf028be5a8b
                                        • Opcode Fuzzy Hash: 02151954d58329d9bf924ee8393493ca76bf5563b245eaae9e46fdaef9fbba2e
                                        • Instruction Fuzzy Hash: B511DA762843047BDF195E66FC07EEB3FA9EBD5B90F0010A4FA10762D1D661CA60DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E632F9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcquireCredentialsHandleA: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcquireCredentialsHandleA
                                        • API String ID: 689400697-1172745827
                                        • Opcode ID: 9f8855cf26922eb20c8e515ab23c29b1c36d313200c0ebde7b1075afd523edc5
                                        • Instruction ID: 8695fd81f64424b32c912c2eb6a3b2dccdc18fbb5e8c6f58c9d8b3c24cb88e35
                                        • Opcode Fuzzy Hash: 9f8855cf26922eb20c8e515ab23c29b1c36d313200c0ebde7b1075afd523edc5
                                        • Instruction Fuzzy Hash: 3E119D362C43057BDF252E66EC07EEB3FA9EBC5790F001094FA14752D1DA62CA60DBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63227
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcquireCredentialsHandleW: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcquireCredentialsHandleW
                                        • API String ID: 689400697-2657764935
                                        • Opcode ID: e0ceb40c97e8342a3ee6044e2ee7757cf5e8911ca5536a6161661dd6ffc05794
                                        • Instruction ID: 333d4473d14ecebd10f113f75fa57fd20dbce706749b2ad2a4ac9fcdec0dbe16
                                        • Opcode Fuzzy Hash: e0ceb40c97e8342a3ee6044e2ee7757cf5e8911ca5536a6161661dd6ffc05794
                                        • Instruction Fuzzy Hash: 4211E7362843047BDB151E62ED07EAB3BA9EB85754F0010A4FE00752E1D662CA60DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6417E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$SetContextAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_SetContextAttributesA
                                        • API String ID: 689400697-1164902870
                                        • Opcode ID: 2b9bd5a6c3e487e4a63bb3286f5a1592dd4be59a1c5b659ec6fb1c2dd406a9d2
                                        • Instruction ID: d8e5ef79f0bb60b56fa36c7bf9a148e56830afccf50d01fb3ebe31c6e5c8ed88
                                        • Opcode Fuzzy Hash: 2b9bd5a6c3e487e4a63bb3286f5a1592dd4be59a1c5b659ec6fb1c2dd406a9d2
                                        • Instruction Fuzzy Hash: 8311AB763C43057BDA256957BC07EA73EACDBD2BA1F0020A4F910B52D1D961CA90D7A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E640BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$SetContextAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_SetContextAttributesW
                                        • API String ID: 689400697-247170817
                                        • Opcode ID: d81e29a8eab7c558e65c8fb66757b048a50379d42f49176b1383ae362cfcc8a7
                                        • Instruction ID: e33326e463c7dace4aaa7e85b9f0b63cdd355a81f931bc1076fe0a1432ecf9b4
                                        • Opcode Fuzzy Hash: d81e29a8eab7c558e65c8fb66757b048a50379d42f49176b1383ae362cfcc8a7
                                        • Instruction Fuzzy Hash: BC11CD763C43057BDA256957FC03EA73EACDBD2B91F0050A4F910B52D1D951CE90D7A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E64544
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$VerifySignature: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_VerifySignature
                                        • API String ID: 689400697-1495805676
                                        • Opcode ID: a52ddb7aceaacde921dc8ca89b1c32f3553c963bb38497725bb2f22591dabb09
                                        • Instruction ID: edb45db15f2c03e4ede43e1daf4b2e6b2de210c00913538461572bfc9733a0a9
                                        • Opcode Fuzzy Hash: a52ddb7aceaacde921dc8ca89b1c32f3553c963bb38497725bb2f22591dabb09
                                        • Instruction Fuzzy Hash: 6C11EBB63C43007BDA256957BC07EA73FADDBC1B90F0010A4FA01B52D1D951CE50DBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E64481
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$MakeSignature: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_MakeSignature
                                        • API String ID: 689400697-3834539683
                                        • Opcode ID: f1faea2b845f191b41f74277d3a3000f9f7806de9fc7e8aa7e702a83b74a4ddf
                                        • Instruction ID: c043659e77455f7efaa4243f7ed7f329f0f1a56ae257f4e490282f01426cbe96
                                        • Opcode Fuzzy Hash: f1faea2b845f191b41f74277d3a3000f9f7806de9fc7e8aa7e702a83b74a4ddf
                                        • Instruction Fuzzy Hash: 8611C8753C43047BD6351956BD03FA73AACDBC1BA0F0050A4FA10B56D1DD51CA50DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6360B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImportSecurityContextA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImportSecurityContextA
                                        • API String ID: 689400697-848437295
                                        • Opcode ID: d165a0da26b0e277356a326eea8ec15f3834bffcf6515e7092698b314ca4d632
                                        • Instruction ID: 381576ec5da669b766c9d275912c93330334c005b63aa1a06e990193b88c633d
                                        • Opcode Fuzzy Hash: d165a0da26b0e277356a326eea8ec15f3834bffcf6515e7092698b314ca4d632
                                        • Instruction Fuzzy Hash: 2811E7763C43007BDA255966FD07EAB3FACDBC2BA0F0010A4F900B52D1DA61CB50DBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63548
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImportSecurityContextW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImportSecurityContextW
                                        • API String ID: 689400697-3257054040
                                        • Opcode ID: 33d53fec66acfae81268fee4845ee3f1a16fd6616db11a94b1b82df7477f5b21
                                        • Instruction ID: d4bbe94f58b490540d71c6dfe96200d8db89db89dbaa008adecf4af9a8b80026
                                        • Opcode Fuzzy Hash: 33d53fec66acfae81268fee4845ee3f1a16fd6616db11a94b1b82df7477f5b21
                                        • Instruction Fuzzy Hash: B611C8353C43007BD6252966FD07F673AACEBC1BD0F0010A4F911B62D1D951CB54DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E633CB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ExportSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ExportSecurityContext
                                        • API String ID: 689400697-3640258815
                                        • Opcode ID: 21b797150591583e1213f4f1266baab13efa167ce7727d3aad9bea0b609324a4
                                        • Instruction ID: 86339291d98ce2879c4454eeb354f494722348c433dc870fa201f393ccd89466
                                        • Opcode Fuzzy Hash: 21b797150591583e1213f4f1266baab13efa167ce7727d3aad9bea0b609324a4
                                        • Instruction Fuzzy Hash: FF1198753C43047AEA252A67BC07E6B7AACDBD1BD0F0050A4FA10B62D1DD61CB54DBA1
                                        APIs
                                        • ncrush_context_reset.GETSCREEN-456311346-X86(00000000,00000000), ref: 00E31B36
                                        Strings
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\ncrush.c, xrefs: 00E31B19
                                        • com.freerdp.codec, xrefs: 00E31AF1
                                        • ncrush_context_new: failed to initialize tables, xrefs: 00E31B0F
                                        • ncrush_context_new, xrefs: 00E31B14
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ncrush_context_reset
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\ncrush.c$com.freerdp.codec$ncrush_context_new$ncrush_context_new: failed to initialize tables
                                        • API String ID: 2838332675-904927664
                                        • Opcode ID: a806ddc9da2ffb415512c10a66e8e58a8783ea1e98f2465fe0119025518925d6
                                        • Instruction ID: 22555fa9c851b115ad4848b55417b6d66892e71893920f43fbef9acac4466c5e
                                        • Opcode Fuzzy Hash: a806ddc9da2ffb415512c10a66e8e58a8783ea1e98f2465fe0119025518925d6
                                        • Instruction Fuzzy Hash: 7511C8B32447027AE318AB25AC42FA7F7E8EB41754F10512DF518B6681EFB2E950C7E1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63F3E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryContextAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryContextAttributesA
                                        • API String ID: 689400697-3211427146
                                        • Opcode ID: d82e8b4ab3e004ba6e0cf5ab52d5c3059ad5006fa1d280d9a8decc2a9f41a270
                                        • Instruction ID: 3d9d605a8a6a25155f573cdacb87acdd97a2a1b48d17c738d31ca151d0758ff7
                                        • Opcode Fuzzy Hash: d82e8b4ab3e004ba6e0cf5ab52d5c3059ad5006fa1d280d9a8decc2a9f41a270
                                        • Instruction Fuzzy Hash: BE11C4357C8301BBD6252A66BC03EAB3EADDBC1BA0F0050A4F910B52D1D9A2CB50D7A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63E7E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryContextAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryContextAttributesW
                                        • API String ID: 689400697-2578917824
                                        • Opcode ID: 3eeaf422c454d29ab15d2cd81cc7c61cb3f79bcfe23f51ef35fb8e0893ff2440
                                        • Instruction ID: 52178872a8a40a1986fd87d2fc2be3383b821c587634ccf33573d503b611bc83
                                        • Opcode Fuzzy Hash: 3eeaf422c454d29ab15d2cd81cc7c61cb3f79bcfe23f51ef35fb8e0893ff2440
                                        • Instruction Fuzzy Hash: E911CA763C43007BDA355667BC03EAB3AACEBD2BA5F0010A5F914B52D1D962CB50D7B1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6378E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryCredentialsAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryCredentialsAttributesA
                                        • API String ID: 689400697-3754301720
                                        • Opcode ID: 4a435f5a69d6af655f5c34275c5ecfae742d31b43b8aa735f14bc991ff77ebbc
                                        • Instruction ID: 53e7b46e2c8f90393eafad746c5b6356ff818efb5624c7e0d10c5b9a3dd25b98
                                        • Opcode Fuzzy Hash: 4a435f5a69d6af655f5c34275c5ecfae742d31b43b8aa735f14bc991ff77ebbc
                                        • Instruction Fuzzy Hash: 0B110DB53C43007AE6241667FC07EAB7BACEBD1B91F0020A5FD10B52D1D961DB51DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E636CE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryCredentialsAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryCredentialsAttributesW
                                        • API String ID: 689400697-3413647607
                                        • Opcode ID: 46451f6da7d0e1f2bbf103b3b25f7f562ac5126883a205a4d2b7cf38ea148905
                                        • Instruction ID: 8e9634b9df16397052a446120745a1659f1013308727c755b2171820fabc21bf
                                        • Opcode Fuzzy Hash: 46451f6da7d0e1f2bbf103b3b25f7f562ac5126883a205a4d2b7cf38ea148905
                                        • Instruction Fuzzy Hash: D4110AB53C43007BE6251667FC07E6B7BACDBD2B90F0010A5F900B62D1D961DB50DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63FFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityContextToken: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityContextToken
                                        • API String ID: 689400697-2156878011
                                        • Opcode ID: 5ddb65a79a45175d2bae02819fa946a9941874d41c8b9e5e3017334c70b83c97
                                        • Instruction ID: 06d4f24d3f24537e854db4fdcdcf64e9eaf97b4025cbd4ccd466ee8896ca069f
                                        • Opcode Fuzzy Hash: 5ddb65a79a45175d2bae02819fa946a9941874d41c8b9e5e3017334c70b83c97
                                        • Instruction Fuzzy Hash: 7B11E9793C43007BD6756567FC07FA73AACDBC2BA0F0050A4FA04B62D2D991CA50D7A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6316A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityPackageInfoA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityPackageInfoA
                                        • API String ID: 689400697-3351603741
                                        • Opcode ID: 01c7017f153d6c13998efd91667037f7e1171298a53fbc835e6c5acad39222c8
                                        • Instruction ID: 2a414001a8bea6edb7a0a957dd5e46181e89e743ca05eb6f98b617f65fe40806
                                        • Opcode Fuzzy Hash: 01c7017f153d6c13998efd91667037f7e1171298a53fbc835e6c5acad39222c8
                                        • Instruction Fuzzy Hash: 3E11E9753C83007AD6252667BD07EB73EACDBD2B61F0010A4FA00B62D2DA91DB50DBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E630AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityPackageInfoW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityPackageInfoW
                                        • API String ID: 689400697-2261828479
                                        • Opcode ID: bd3e309e46da99f0325010a6a12493d40715380ad09795af3870093498131ba0
                                        • Instruction ID: b1a0e5fb040974e4cfb875327f6ab37b8badc10866f242d64e8ef9151c80961b
                                        • Opcode Fuzzy Hash: bd3e309e46da99f0325010a6a12493d40715380ad09795af3870093498131ba0
                                        • Instruction Fuzzy Hash: 8711C6753C83003AE6246667BC07EB77AACDBC2BA4F0020A4F914B62D2D991CF5097B5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E62FF0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EnumerateSecurityPackagesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EnumerateSecurityPackagesA
                                        • API String ID: 689400697-1149382491
                                        • Opcode ID: 22a5c708b7a2e6ac03853f4816809bee1443dd0cdfaed9e403fc6c05f564609e
                                        • Instruction ID: 34f98a0556bdba05c91f024603587cce789755aff9aee8643345b61c6055c02e
                                        • Opcode Fuzzy Hash: 22a5c708b7a2e6ac03853f4816809bee1443dd0cdfaed9e403fc6c05f564609e
                                        • Instruction Fuzzy Hash: 0E11A3353C83007AE6342566FD07EAB7BADDBC2BA0F0060E4FA04B56D1D951CE5497A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E62F33
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EnumerateSecurityPackagesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EnumerateSecurityPackagesW
                                        • API String ID: 689400697-255015424
                                        • Opcode ID: cb2038dc8eb0e09e42c68da1db321433d1415912117c9fa2a88fd52f2203eb94
                                        • Instruction ID: 77951c57781bb3d318a43465a4c49fe336059e8102da810706ed81e71eb074b9
                                        • Opcode Fuzzy Hash: cb2038dc8eb0e09e42c68da1db321433d1415912117c9fa2a88fd52f2203eb94
                                        • Instruction Fuzzy Hash: CF1106753C83003BD6242657BC07EA73EACDBD2BA0F0010A8FA14B62D1D951CA409BA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E639DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$CompleteAuthToken: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_CompleteAuthToken
                                        • API String ID: 689400697-1972714555
                                        • Opcode ID: bc43608ccc91a0abed6432db55dabf3c83779958a8cd5e0fe693df7de0f714f4
                                        • Instruction ID: 561e8ff2707970c565fa0a795789ebf9f91eda4573187689a6e9e67f8dc3fa79
                                        • Opcode Fuzzy Hash: bc43608ccc91a0abed6432db55dabf3c83779958a8cd5e0fe693df7de0f714f4
                                        • Instruction Fuzzy Hash: 4411AC753C43007BD6256567FD07EA77EACDBD1BA0F0010A4F910B66D1D951CB50EBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63920
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: ApplyControlToken: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_ApplyControlToken
                                        • API String ID: 689400697-2845897268
                                        • Opcode ID: fa98417fcfe083873c2b674f6c7d0ca99dea087fffa01017104b7ecdcba961a1
                                        • Instruction ID: 6417c199027f78a8862e58309d45a896e05f7c205cbf7a2063939eaea9b1a9b3
                                        • Opcode Fuzzy Hash: fa98417fcfe083873c2b674f6c7d0ca99dea087fffa01017104b7ecdcba961a1
                                        • Instruction Fuzzy Hash: F411A9753C43007AEA252567BD07EA77AACDBD2BE0F0014A8F900B66D5D9A1CF50DFA1
                                        APIs
                                        • freerdp_image_copy.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00E395B5
                                        Strings
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c, xrefs: 00E395F0
                                        • freerdp_image_scale, xrefs: 00E395EB
                                        • SmartScaling requested but compiled without libcairo support!, xrefs: 00E395E6
                                        • com.freerdp.color, xrefs: 00E395C8
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_image_copy
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c$SmartScaling requested but compiled without libcairo support!$com.freerdp.color$freerdp_image_scale
                                        • API String ID: 1523062921-212429655
                                        • Opcode ID: d8bf8da19b8a16a9ba2056f1710520407b23dae81e9a759662a7b6860a2d30b9
                                        • Instruction ID: ab4a462e10e21578b0a699749f0ebce772f68f8b049a1dc8b45dfa412b4e8e1e
                                        • Opcode Fuzzy Hash: d8bf8da19b8a16a9ba2056f1710520407b23dae81e9a759662a7b6860a2d30b9
                                        • Instruction Fuzzy Hash: 352103B234020DBBDF19DE50DD02FAD3BA9EB54704F005019FD14AA290E3B1DA90DB90
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E64241
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$RevertSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_RevertSecurityContext
                                        • API String ID: 689400697-954186549
                                        • Opcode ID: c833d1dc6b77d9d318e78e53bc6f46d5d3dfd099cf97ed15578ae34e36f82930
                                        • Instruction ID: c70eaa5329169b6776b21a2bda4f02c3af67d0952d859f7625939086106f71c3
                                        • Opcode Fuzzy Hash: c833d1dc6b77d9d318e78e53bc6f46d5d3dfd099cf97ed15578ae34e36f82930
                                        • Instruction Fuzzy Hash: FD11E5B53C43003BE6352557BC07FA73AACDBD2BA0F1020A5F900B66D1D991CE90DAA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63C0E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImpersonateSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImpersonateSecurityContext
                                        • API String ID: 689400697-4242683877
                                        • Opcode ID: 26fb325814344dcc9eaceb89f257fbd83ce2e051193677c1ffd483b40772e8c3
                                        • Instruction ID: 462408cb9a880fff7006908a1fddcb8c012246144ca8b3086a4d164a0020ccec
                                        • Opcode Fuzzy Hash: 26fb325814344dcc9eaceb89f257fbd83ce2e051193677c1ffd483b40772e8c3
                                        • Instruction Fuzzy Hash: 5911A1763C43007BE6252667BD07FA77EACDBD2BA0F0420A5F900B62D1D991CB50DAB1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63B54
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$FreeContextBuffer: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_FreeContextBuffer
                                        • API String ID: 689400697-1791514552
                                        • Opcode ID: 7f47a1ee984b6771ccf18f10e9d0e47c47e32eb16bd09abedb72b45c7d08f6c5
                                        • Instruction ID: 2d7b5f4ff001a67e3549e71d8a70912db773cd4e6a171f76c07cbca59e2c858e
                                        • Opcode Fuzzy Hash: 7f47a1ee984b6771ccf18f10e9d0e47c47e32eb16bd09abedb72b45c7d08f6c5
                                        • Instruction Fuzzy Hash: 2211A0753C43013BEA252567BC07EA73AACDBD2BA1F0020A8F900B62C1DD91CF409BA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63A9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$DeleteSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_DeleteSecurityContext
                                        • API String ID: 689400697-4185332897
                                        • Opcode ID: a432c4533eda32ecf45d94e11d31162058b942ef0cb443d0447c51612b1d6250
                                        • Instruction ID: 9336914270dd52d0693e13843300952d21b6a09a2464dc56ed9e186e8894bc78
                                        • Opcode Fuzzy Hash: a432c4533eda32ecf45d94e11d31162058b942ef0cb443d0447c51612b1d6250
                                        • Instruction Fuzzy Hash: 8311E5753C43003AE6255667BD07EA77AACDBD2BA0F0020B8F904B62D1D991CB40EBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6348E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$FreeCredentialsHandle: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_FreeCredentialsHandle
                                        • API String ID: 689400697-3116451197
                                        • Opcode ID: 8e02f2ad0f7265cb51934fb4903b9a0c77e6cf1a3296531604f160fa7287e7d0
                                        • Instruction ID: 02b05dd8b2a868b89bb14aa82929d1eb433c5ee74152d28e5de7fd360ccbdd85
                                        • Opcode Fuzzy Hash: 8e02f2ad0f7265cb51934fb4903b9a0c77e6cf1a3296531604f160fa7287e7d0
                                        • Instruction Fuzzy Hash: 9B11A0663C43007AE6352566BC07E677AAC9BD2BE0F0060A4FA10B62C1DD91CA80DAA5
                                        APIs
                                        • primitives_get.GETSCREEN-456311346-X86 ref: 00EE65CB
                                        Strings
                                        • error when decoding lines, xrefs: 00EE6629
                                        • com.freerdp.codec, xrefs: 00EE660B
                                        • yuv_process_work_callback, xrefs: 00EE662E
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\yuv.c, xrefs: 00EE6633
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: primitives_get
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\yuv.c$com.freerdp.codec$error when decoding lines$yuv_process_work_callback
                                        • API String ID: 2017034601-2620645302
                                        • Opcode ID: 5b592086a31e67e5b6af1ea060cae850668f8db5ec3c4dc6684bd29bb0e5228c
                                        • Instruction ID: 1fd8aa656813861260a1797a8db7797e020c6292e64864cf4854f18d69254792
                                        • Opcode Fuzzy Hash: 5b592086a31e67e5b6af1ea060cae850668f8db5ec3c4dc6684bd29bb0e5228c
                                        • Instruction Fuzzy Hash: C70184B160024ABFD728DF54DC02E5A77E8FF18758F004569F904EA291EAB1EA908B94
                                        APIs
                                        • region16_extents.GETSCREEN-456311346-X86(?), ref: 00E39F06
                                        • region16_extents.GETSCREEN-456311346-X86(?,?), ref: 00E39F12
                                        • region16_n_rects.GETSCREEN-456311346-X86(?,?,?), ref: 00E39F1D
                                        • region16_n_rects.GETSCREEN-456311346-X86(?), ref: 00E39F7D
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: region16_extentsregion16_n_rects
                                        • String ID:
                                        • API String ID: 2062899502-0
                                        • Opcode ID: a777aa3e440b79e1151d2e5a78892d79e860e14bb9abc1479bfd8844a7d2d6d9
                                        • Instruction ID: 69f91caea2264b4d67aee447bed70906809595123102eebc9f25a400aabc9790
                                        • Opcode Fuzzy Hash: a777aa3e440b79e1151d2e5a78892d79e860e14bb9abc1479bfd8844a7d2d6d9
                                        • Instruction Fuzzy Hash: 88512875A0012A9BCB14DF99C8458BEF7F5FF18310F15816AE859B7251E334AE80CBA0
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(01091278,00858C90,00858EC0,00000000), ref: 00858E6A
                                        • GetLastError.KERNEL32 ref: 00858E7F
                                        • TlsGetValue.KERNEL32 ref: 00858E8D
                                        • SetLastError.KERNEL32(00000000), ref: 00858E96
                                        • TlsAlloc.KERNEL32 ref: 00858EC3
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorLastOnce$AllocExecuteInitValue
                                        • String ID:
                                        • API String ID: 2822033501-0
                                        • Opcode ID: fddb55c92fc3f95103082b4bde67679c124bbfa68660a0bf1d083cba8863b39d
                                        • Instruction ID: 5cd7e1ec70fd2e7ded8ed36b3a9cd436d6bd23a4df4187fb18a8de1f9f10f8b7
                                        • Opcode Fuzzy Hash: fddb55c92fc3f95103082b4bde67679c124bbfa68660a0bf1d083cba8863b39d
                                        • Instruction Fuzzy Hash: 4F01C875600209DFCB10AFB5EC49A7B77B8FB49721B400166FD55F7280EB356918CB50
                                        APIs
                                        • audio_format_print.GETSCREEN-456311346-X86(?,?,?), ref: 00EE4A72
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: audio_format_print
                                        • String ID: AUDIO_FORMATS (%hu) ={$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c$audio_formats_print
                                        • API String ID: 2744001552-3527835062
                                        • Opcode ID: b69c94f661f8dfdd42df8bbae77573d94b30b2215105e5312da0b2ff2128f516
                                        • Instruction ID: 3b9b7734f542691c7622bb54256602cfd94a3cbc71deef2f7e78cb8bd6becc3e
                                        • Opcode Fuzzy Hash: b69c94f661f8dfdd42df8bbae77573d94b30b2215105e5312da0b2ff2128f516
                                        • Instruction Fuzzy Hash: A61129B228031D33DB11AD265C42FBF2BAC9FA5B74F081415FE08B11D1FAA1D60093BA
                                        APIs
                                        • getChannelError.GETSCREEN-456311346-X86(?), ref: 00DE1248
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ChannelError
                                        • String ID: ($ChannelDetached$freerdp
                                        • API String ID: 1163697128-436519898
                                        • Opcode ID: aec81047aca3a7e6f9ae0b98a06152a80f697d00169d372d49396d9a0359f1ec
                                        • Instruction ID: 3896027541e05deda82a516eee874662b9fd5c92a0425d8f686e687bece6da2c
                                        • Opcode Fuzzy Hash: aec81047aca3a7e6f9ae0b98a06152a80f697d00169d372d49396d9a0359f1ec
                                        • Instruction Fuzzy Hash: 52216D75A00209AFDB00DF98CC85FAEBBF4FF08340F104469E944EB251D771AA549BA0
                                        APIs
                                        • getChannelError.GETSCREEN-456311346-X86(?), ref: 00DE0BB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ChannelError
                                        • String ID: ($ChannelAttached$freerdp
                                        • API String ID: 1163697128-2646891115
                                        • Opcode ID: 15eef9cf0a6e95e2cd42a3deb5775c99feea1b9a9f156158c24bc8b2f67b32f0
                                        • Instruction ID: 9fd5ab366472f6f6de33038eb698feacf2afbbaba3d4fe7cfddc660991f6d109
                                        • Opcode Fuzzy Hash: 15eef9cf0a6e95e2cd42a3deb5775c99feea1b9a9f156158c24bc8b2f67b32f0
                                        • Instruction Fuzzy Hash: 2A212D71A00209EFDB10DF99C885FAEBBF4FF08344F144569E948A7252D771AA90DBA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: audin$rdpsnd
                                        • API String ID: 0-930729200
                                        • Opcode ID: 6ac1729ec4dbc08763f120fc895001cc0356be666dc5af06c4862508135e36f4
                                        • Instruction ID: c60c1df860b272b07c567aa1400646e121bba859ffce5e191948eadc49633934
                                        • Opcode Fuzzy Hash: 6ac1729ec4dbc08763f120fc895001cc0356be666dc5af06c4862508135e36f4
                                        • Instruction Fuzzy Hash: 0711B631A04A16EFDB24CF25D880799F3A5BF04B46F15562AE89863141D7316DA4CFD1
                                        APIs
                                        • audio_format_get_tag_string.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?), ref: 00EE4737
                                        Strings
                                        • %s: wFormatTag: 0x%04hX nChannels: %hu nSamplesPerSec: %u nAvgBytesPerSec: %u nBlockAlign: %hu wBitsPerSample: %hu cbSize: %hu, xrefs: 00EE473E
                                        • audio_format_print, xrefs: 00EE4743
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c, xrefs: 00EE4748
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: audio_format_get_tag_string
                                        • String ID: %s: wFormatTag: 0x%04hX nChannels: %hu nSamplesPerSec: %u nAvgBytesPerSec: %u nBlockAlign: %hu wBitsPerSample: %hu cbSize: %hu$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c$audio_format_print
                                        • API String ID: 2866491501-3564663344
                                        • Opcode ID: 77acf7e2ef88f229e10e96b3bdbd509bef6c757bae6c82b87fb5334b70f2c502
                                        • Instruction ID: 440345081540eb48abd484f348dd16a0e0ab9240da2274fd2cff6d52299538b4
                                        • Opcode Fuzzy Hash: 77acf7e2ef88f229e10e96b3bdbd509bef6c757bae6c82b87fb5334b70f2c502
                                        • Instruction Fuzzy Hash: 4BF096B50402087ADB041F51CC02E3537ADEF48B15B248049FD1CAC1E1E777D9A2E360
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00E66F93
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00E66FC0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID: G$G
                                        • API String ID: 3168844106-3574868976
                                        • Opcode ID: 791fa75a28bdb13f0747db27a2ae01a24216ced037381166fd49f510852d1203
                                        • Instruction ID: 57fc5f8b69de35f7ff8522c78f26e7737835770a8dcec4f2cbbb3c3503a03859
                                        • Opcode Fuzzy Hash: 791fa75a28bdb13f0747db27a2ae01a24216ced037381166fd49f510852d1203
                                        • Instruction Fuzzy Hash: C9F03A352106068FD724DF5AE548AA7F3E9FF44364B50582DE58693960DB70F884CB80
                                        APIs
                                        • freerdp_get_last_error.GETSCREEN-456311346-X86(?), ref: 00DD2725
                                        • freerdp_set_last_error_ex.GETSCREEN-456311346-X86(?,0002000B,freerdp_abort_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,0000013A), ref: 00DD2745
                                        Strings
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c, xrefs: 00DD2734
                                        • freerdp_abort_connect, xrefs: 00DD2739
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_get_last_errorfreerdp_set_last_error_ex
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c$freerdp_abort_connect
                                        • API String ID: 3690923134-629580617
                                        • Opcode ID: 430f35d9f63700bceadd1c8d33bc45d112b64aa323f4c4b25dfc05c6f58a1948
                                        • Instruction ID: 7912ae387109876b17141189558ce825ba7e0c49fa567d178e6de14723a356cd
                                        • Opcode Fuzzy Hash: 430f35d9f63700bceadd1c8d33bc45d112b64aa323f4c4b25dfc05c6f58a1948
                                        • Instruction Fuzzy Hash: FAE0D831244211FAEA313D10EC02B65F794DF20BA0F180427B5C475291E6529952A6B2
                                        APIs
                                        • primitives_get.GETSCREEN-456311346-X86 ref: 00EE633F
                                        • primitives_flags.GETSCREEN-456311346-X86(00000000), ref: 00EE6353
                                        • TpWaitForWork.NTDLL(00000000,00000000), ref: 00EE64A9
                                        • TpReleaseWork.NTDLL(00000000), ref: 00EE64B2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Work$ReleaseWaitprimitives_flagsprimitives_get
                                        • String ID:
                                        • API String ID: 704174238-0
                                        • Opcode ID: 46c0d5a9f2dd080a08aa115e10aa0df87e5ce6d485e8522073ef26dfeb37451c
                                        • Instruction ID: 2f7fe294b43686a24c119c6aef612c49b081dd285dabcc25e1760e275aeac936
                                        • Opcode Fuzzy Hash: 46c0d5a9f2dd080a08aa115e10aa0df87e5ce6d485e8522073ef26dfeb37451c
                                        • Instruction Fuzzy Hash: 746124B5A0060A9FCB14DFA9C881AAEFBF5FF58350B14856AE819E7350D730E951CF90
                                        APIs
                                        • gdi_SetRgn.GETSCREEN-456311346-X86(?,?,?,?,00000000,00000001,?,?), ref: 00E3C324
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: gdi_
                                        • String ID:
                                        • API String ID: 2273374161-0
                                        • Opcode ID: 2ead09a44aba127efa6001147bae376ec00e50ab3ae76740fbfd5d3136eef1b6
                                        • Instruction ID: 5cb0644e02b06bd4d459725cce8ee2aee827be97f5f90fa96c079dbf75729514
                                        • Opcode Fuzzy Hash: 2ead09a44aba127efa6001147bae376ec00e50ab3ae76740fbfd5d3136eef1b6
                                        • Instruction Fuzzy Hash: 8B31B5B1A00209EFCB10DF98C9859AEBBF9FF48314F14906AE915F7211D334EA45CBA0
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00E65C16
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00E65C34
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00E65C54
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00E65C9A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$Enter
                                        • String ID:
                                        • API String ID: 2978645861-0
                                        • Opcode ID: 52a745a3ea251d4f439f906085e0dc8fdd8609793b6ec2e39a4348e7baa87882
                                        • Instruction ID: cf909c7e6843a1f47bd0e1f2a4850bb057bc60fbbd4a659ef5aa1ef2ae614687
                                        • Opcode Fuzzy Hash: 52a745a3ea251d4f439f906085e0dc8fdd8609793b6ec2e39a4348e7baa87882
                                        • Instruction Fuzzy Hash: 9721AC72200B05EFDB20CF14E984A6AB7F4FB853A5F115429F882B7290E770AD81CB50
                                        APIs
                                          • Part of subcall function 00ECF42C: GetLastError.KERNEL32(00000000,?,00EB5FDD,00ECF0E3,?,?,00E5F77A,0000000C,?,?,?,?,00DD27D2,?,?,?), ref: 00ECF581
                                          • Part of subcall function 00ECF42C: SetLastError.KERNEL32(00000000,000000FF,00000006), ref: 00ECF623
                                        • CloseHandle.KERNEL32(?,?,?,00EBB817,?,?,00EBB689,00000000), ref: 00EBB711
                                        • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,00EBB817,?,?,00EBB689,00000000), ref: 00EBB727
                                        • RtlExitUserThread.NTDLL(?,?,?,00EBB817,?,?,00EBB689,00000000), ref: 00EBB730
                                        • GetModuleHandleExW.KERNEL32(00000004,?,0000000C), ref: 00EBB76E
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorExitHandleLastThread$CloseFreeLibraryModuleUser
                                        • String ID:
                                        • API String ID: 1062721995-0
                                        • Opcode ID: 5c494b46703bdee4a5ce192e4a92bb2d05bc51d2a73cc50d1f59570d9bd2c29b
                                        • Instruction ID: 6071dc56eb7ee88a934799f5cf3b3f41c866120a4682bfa2b9121967da35e14e
                                        • Opcode Fuzzy Hash: 5c494b46703bdee4a5ce192e4a92bb2d05bc51d2a73cc50d1f59570d9bd2c29b
                                        • Instruction Fuzzy Hash: E71196B1500214AFC7209B66DC05EAB7BE9DFC1764F14922AF915B72A1DBB0DD05C690
                                        APIs
                                        • region16_rects.GETSCREEN-456311346-X86(?,00000000), ref: 00E39BDC
                                        • region16_extents.GETSCREEN-456311346-X86(?), ref: 00E39BEC
                                        • rectangles_intersects.GETSCREEN-456311346-X86(00000000,?), ref: 00E39BF7
                                          • Part of subcall function 00E397FD: rectangles_intersection.GETSCREEN-456311346-X86(?,?,?), ref: 00E3980C
                                        • rectangles_intersects.GETSCREEN-456311346-X86(00000000,?), ref: 00E39C1A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: rectangles_intersects$rectangles_intersectionregion16_extentsregion16_rects
                                        • String ID:
                                        • API String ID: 3854534691-0
                                        • Opcode ID: 3ae0e6e2282d69f6a29daa640538588f82f3507cb970e478017c8bd43d05d967
                                        • Instruction ID: eaf2c07545d4090a2394e3065886c1a9d6160283dbfe47de91cf3fc671c175a4
                                        • Opcode Fuzzy Hash: 3ae0e6e2282d69f6a29daa640538588f82f3507cb970e478017c8bd43d05d967
                                        • Instruction Fuzzy Hash: 0E01F93311421969DB24DB55D8C9ABBFBDCDF40768F14701AFC98B6042EBB9EC81C1A4
                                        APIs
                                        • freerdp_new.GETSCREEN-456311346-X86 ref: 00E51F56
                                        • freerdp_context_new.GETSCREEN-456311346-X86(00000000,00000000,?,?), ref: 00E51FA4
                                        • freerdp_register_addin_provider.GETSCREEN-456311346-X86(?,00000000), ref: 00E51FC7
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_context_newfreerdp_newfreerdp_register_addin_provider
                                        • String ID:
                                        • API String ID: 3731710698-0
                                        • Opcode ID: b5ee02031d702c206cf4b24eea165274f1375625596cbb555cc4b3be06c1ef26
                                        • Instruction ID: 7e2bc0ef03cf0ca62d5bd4ca06ed7b2d108af4882d646c66abe36a5388578cea
                                        • Opcode Fuzzy Hash: b5ee02031d702c206cf4b24eea165274f1375625596cbb555cc4b3be06c1ef26
                                        • Instruction Fuzzy Hash: 0D119131608B026BC725AF66D801B97B7A5FF50325F10195EFC58A7340EB70E854C6A0
                                        APIs
                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0,?,?,?,00E66A0A,?,?,00000000,?,00E5E976,00000000), ref: 00E6697B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpin
                                        • String ID: %s: unknown handler type %u$WLog_Appender_New
                                        • API String ID: 2593887523-3466059274
                                        • Opcode ID: e76560077f0c62744d600d71edcbf461af9666849f118a206fc093fe70bd6f39
                                        • Instruction ID: 714f34ee127591ad922fa21f47209061984bc51f546e7953ad7b2f1677070b4e
                                        • Opcode Fuzzy Hash: e76560077f0c62744d600d71edcbf461af9666849f118a206fc093fe70bd6f39
                                        • Instruction Fuzzy Hash: 80112C361E8201669526797D7C4A9BF6BAC9BC3BF47147019FC05F6291DE31DC016352
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s-client.%s$DeviceServiceEntry
                                        • API String ID: 0-2733899524
                                        • Opcode ID: fdcdf0c3a75546570e6b38671953278c85c7afa7f3b5ece8a94330366fbc3967
                                        • Instruction ID: 0e04b7f6fcf9c3495848064149bd1beb98e0fefdfdacdf0c40d17bc34a760c8c
                                        • Opcode Fuzzy Hash: fdcdf0c3a75546570e6b38671953278c85c7afa7f3b5ece8a94330366fbc3967
                                        • Instruction Fuzzy Hash: 83118F72A00319ABAB119E99C881ABF7BACEF41B50F48401BFD14D7341D770DE418BA1
                                        APIs
                                        • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000003,00000080,00000000), ref: 00E14060
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00E14076
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: File$CreatePointer
                                        • String ID: %s %hu %s %s %s
                                        • API String ID: 2024441833-2916857029
                                        • Opcode ID: cbb73cd5432e137a8a2b5712b8df72780c184f354b73149d18db2f2c73518b6d
                                        • Instruction ID: 22b09d4952f632912d83c7cd2691607a00e29dae55163ad53ed6d08b2af3f901
                                        • Opcode Fuzzy Hash: cbb73cd5432e137a8a2b5712b8df72780c184f354b73149d18db2f2c73518b6d
                                        • Instruction Fuzzy Hash: 5201F271101120BBCB212B62EC4AEA77F6DEF46374F148115FA18A91E2D722C952D6B0
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILTER,00000000,00000000,00000000,?,00E5E987), ref: 00E5EBF6
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILTER,00000000,00000000,?,?,00E5E987), ref: 00E5EC1A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WLOG_FILTER
                                        • API String ID: 1431749950-2006202657
                                        • Opcode ID: 369c0b16b4feab9d71b1bca2fe8c2bde922fd96d4b620c588eec95a1a2a2e64d
                                        • Instruction ID: ed823f7aadcf64f16b19832bc09b96aa30d5f2748232b59768278865b674cb48
                                        • Opcode Fuzzy Hash: 369c0b16b4feab9d71b1bca2fe8c2bde922fd96d4b620c588eec95a1a2a2e64d
                                        • Instruction Fuzzy Hash: 06F081333042152F46286721BD44C7FFFADD6C57A93100439F404F3140EB658C45C7A1
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WINPR_NATIVE_SSPI,00000000,00000000,?,?,00E64AE3), ref: 00E64BCC
                                        • GetEnvironmentVariableA.KERNEL32(WINPR_NATIVE_SSPI,00000000,00000000,?,?,00E64AE3), ref: 00E64BEC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WINPR_NATIVE_SSPI
                                        • API String ID: 1431749950-1020623567
                                        • Opcode ID: 00fd70fe07e2e2357c33cb0aa46535c688911be9cebfbf4cf62d755ec7ce29f7
                                        • Instruction ID: 62c4c92056118b3113cfe675d7a043245e0e0244178d626e988c022d6b94ef03
                                        • Opcode Fuzzy Hash: 00fd70fe07e2e2357c33cb0aa46535c688911be9cebfbf4cf62d755ec7ce29f7
                                        • Instruction Fuzzy Hash: D6F027F729A1322AE23532697C09FBF8E64CBC2FA4B242128F801F31C1CA40880395D2
                                        APIs
                                        • rfx_context_new.GETSCREEN-456311346-X86(?), ref: 00E2A2ED
                                          • Part of subcall function 00E1E4DD: GetVersionExA.KERNEL32(?), ref: 00E1E5CD
                                          • Part of subcall function 00E1E4DD: GetNativeSystemInfo.KERNEL32(?), ref: 00E1E5E7
                                          • Part of subcall function 00E1E4DD: RegOpenKeyExA.ADVAPI32(80000002,Software\FreeRDP\FreeRDP\RemoteFX,00000000,00020119,?), ref: 00E1E612
                                        • progressive_context_free.GETSCREEN-456311346-X86(00000000), ref: 00E2A36D
                                        Strings
                                        • com.freerdp.codec.progressive, xrefs: 00E2A2CA
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: InfoNativeOpenSystemVersionprogressive_context_freerfx_context_new
                                        • String ID: com.freerdp.codec.progressive
                                        • API String ID: 2699998398-3622116780
                                        • Opcode ID: 5ba3924b6794e24d542a2c683cd2c12f55333a389ef7c413f3d8d6bd4b9f3414
                                        • Instruction ID: 2a0d143d7f3946a56da903b73551763c3f446a8fa62614e99c64445b22ea03f1
                                        • Opcode Fuzzy Hash: 5ba3924b6794e24d542a2c683cd2c12f55333a389ef7c413f3d8d6bd4b9f3414
                                        • Instruction Fuzzy Hash: D6F0BB3360471116D224A775A801F5F67D8DF42B70F18103EF545B6581DA7094418265
                                        APIs
                                        • freerdp_settings_get_key_for_name.GETSCREEN-456311346-X86(?), ref: 00E11EEF
                                        • freerdp_settings_get_type_for_key.GETSCREEN-456311346-X86(00000000), ref: 00E11F51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_get_key_for_namefreerdp_settings_get_type_for_key
                                        • String ID: TRUE
                                        • API String ID: 1888880752-3412697401
                                        • Opcode ID: b0018c061dc66bc6f0a5c1ae96b502b1e74c5eac103324a846d71ed7d750e117
                                        • Instruction ID: 914ef529de10c317ebc9f97e4743c0d9e6d460c205994b83c879ed22557f8aa4
                                        • Opcode Fuzzy Hash: b0018c061dc66bc6f0a5c1ae96b502b1e74c5eac103324a846d71ed7d750e117
                                        • Instruction Fuzzy Hash: B8E055323002187ADA215AAADC82DDB324DEF49FA5B0010A9F604B6541F760D98105A0
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WTSAPI_LIBRARY,00000000,00000000,?,00E67163), ref: 00E67190
                                        • GetEnvironmentVariableA.KERNEL32(WTSAPI_LIBRARY,00000000,00000000,?,?,00E67163), ref: 00E671B1
                                          • Part of subcall function 00E67310: LoadLibraryA.KERNEL32(?,?,00E671C4,00000000,?,?,00E67163), ref: 00E67316
                                          • Part of subcall function 00E67310: GetProcAddress.KERNEL32(00000000,InitWtsApi), ref: 00E6732B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable$AddressLibraryLoadProc
                                        • String ID: WTSAPI_LIBRARY
                                        • API String ID: 3590464466-1122459656
                                        • Opcode ID: ff22423e2a328481ada734a5af3bf4497de66cb21832ec31f79dd5db51c5f386
                                        • Instruction ID: 8824828424cf8eaa5e5d376cd83021b621144d255ce44c90b03515abd5325b94
                                        • Opcode Fuzzy Hash: ff22423e2a328481ada734a5af3bf4497de66cb21832ec31f79dd5db51c5f386
                                        • Instruction Fuzzy Hash: D1E09B3218F53269D1352355BC0AFFF6B55DBC3BBDF20111AF440B61C49B549841C5A6
                                        APIs
                                        • LoadLibraryA.KERNEL32(?,?,00E671C4,00000000,?,?,00E67163), ref: 00E67316
                                        • GetProcAddress.KERNEL32(00000000,InitWtsApi), ref: 00E6732B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.612671242995.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000006.00000002.612671089626.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000102E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000108B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001DDF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E64000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E73000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612671242995.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000006.00000002.612685909304.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: InitWtsApi
                                        • API String ID: 2574300362-3428673357
                                        • Opcode ID: e5418a51d594950483fd05dcdc2d4721a5cf2ccd902b90676f679aced97631ae
                                        • Instruction ID: 98c6753e8e3af54fe012bbdcad875e6835dce6c1102bd5465483b0884c2a33ca
                                        • Opcode Fuzzy Hash: e5418a51d594950483fd05dcdc2d4721a5cf2ccd902b90676f679aced97631ae
                                        • Instruction Fuzzy Hash: EDD012716886059F9B14AFF2BC055267BED97406983045431E819D1294EB71C550E651

                                        Execution Graph

                                        Execution Coverage:0.4%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:0%
                                        Total number of Nodes:57
                                        Total number of Limit Nodes:4
                                        execution_graph 12971 ebb62b 12972 ebb637 12971->12972 12973 ebb64b 12972->12973 12974 ebb63e GetLastError RtlExitUserThread 12972->12974 12977 ecf42c GetLastError 12973->12977 12974->12973 12976 ebb650 12978 ecf442 12977->12978 12979 ecf44c SetLastError 12978->12979 13004 ecf717 12978->13004 12982 ecf4dc 12979->12982 12986 ecf4e1 12979->12986 12982->12976 12983 ecf479 12984 ecf4b9 12983->12984 12985 ecf481 12983->12985 13012 ecf25a 12984->13012 13008 ecf066 12985->13008 12990 ecf4fe 12986->12990 12992 ecf717 RtlAllocateHeap 12986->12992 12993 ecf503 12990->12993 12994 ecf57d GetLastError 12990->12994 12991 ecf066 2 API calls 12991->12979 12996 ecf522 12992->12996 12993->12976 12995 ecf593 12994->12995 13000 ecf622 SetLastError 12995->13000 12997 ecf55e 12996->12997 12998 ecf52a 12996->12998 12999 ecf25a 2 API calls 12997->12999 13001 ecf066 2 API calls 12998->13001 13002 ecf569 12999->13002 13000->12976 13001->12990 13003 ecf066 2 API calls 13002->13003 13003->12993 13007 ecf730 13004->13007 13005 ecf74f RtlAllocateHeap 13006 ecf764 13005->13006 13005->13007 13006->12983 13007->13005 13007->13006 13009 ecf071 HeapFree 13008->13009 13011 ecf093 13008->13011 13010 ecf086 GetLastError 13009->13010 13009->13011 13010->13011 13011->12979 13017 ecf0ee 13012->13017 13018 ecf0fa 13017->13018 13029 ebf2a5 RtlEnterCriticalSection 13018->13029 13020 ecf104 13030 ecf134 13020->13030 13023 ecf200 13024 ecf20c 13023->13024 13034 ebf2a5 RtlEnterCriticalSection 13024->13034 13026 ecf216 13035 ecf24e 13026->13035 13029->13020 13033 ebf2ed RtlLeaveCriticalSection 13030->13033 13032 ecf122 13032->13023 13033->13032 13034->13026 13038 ebf2ed RtlLeaveCriticalSection 13035->13038 13037 ecf23c 13037->12991 13038->13037 13039 1f429e0 13040 1f429f8 13039->13040 13041 1f42b03 LoadLibraryA 13040->13041 13042 1f42b48 VirtualProtect VirtualProtect 13040->13042 13044 1f42b2c GetProcAddress 13040->13044 13041->13040 13045 1f42bc0 13042->13045 13044->13040 13046 1f42b42 ExitProcess 13044->13046

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 1f429e0-1f429f0 1 1f42a02-1f42a07 0->1 2 1f42a09 1->2 3 1f429f8-1f429fd 2->3 4 1f42a0b 2->4 5 1f429fe-1f42a00 3->5 6 1f42a10-1f42a12 4->6 5->1 5->2 7 1f42a14-1f42a19 6->7 8 1f42a1b-1f42a1f 6->8 7->8 9 1f42a21 8->9 10 1f42a2c-1f42a2f 8->10 11 1f42a23-1f42a2a 9->11 12 1f42a4b-1f42a50 9->12 13 1f42a31-1f42a36 10->13 14 1f42a38-1f42a3a 10->14 11->10 11->12 15 1f42a52-1f42a5b 12->15 16 1f42a63-1f42a65 12->16 13->14 14->6 17 1f42ad2-1f42ad5 15->17 18 1f42a5d-1f42a61 15->18 19 1f42a67-1f42a6c 16->19 20 1f42a6e 16->20 21 1f42ada 17->21 18->20 19->20 22 1f42a70-1f42a73 20->22 23 1f42a3c-1f42a3e 20->23 28 1f42adc-1f42ade 21->28 24 1f42a75-1f42a7a 22->24 25 1f42a7c 22->25 26 1f42a47-1f42a49 23->26 27 1f42a40-1f42a45 23->27 24->25 25->23 31 1f42a7e-1f42a80 25->31 32 1f42a9d-1f42aac 26->32 27->26 29 1f42af7 28->29 30 1f42ae0-1f42ae3 28->30 34 1f42afd-1f42b01 29->34 30->28 33 1f42ae5-1f42af5 30->33 35 1f42a82-1f42a87 31->35 36 1f42a89-1f42a8d 31->36 37 1f42abc-1f42ac9 32->37 38 1f42aae-1f42ab5 32->38 33->21 39 1f42b03-1f42b19 LoadLibraryA 34->39 40 1f42b48-1f42b4b 34->40 35->36 36->31 41 1f42a8f 36->41 37->37 43 1f42acb-1f42acd 37->43 38->38 42 1f42ab7 38->42 44 1f42b1a-1f42b1f 39->44 47 1f42b4e-1f42b55 40->47 45 1f42a91-1f42a98 41->45 46 1f42a9a 41->46 42->5 43->5 44->34 48 1f42b21-1f42b23 44->48 45->31 45->46 46->32 49 1f42b57-1f42b59 47->49 50 1f42b79-1f42bbd VirtualProtect * 2 47->50 51 1f42b25-1f42b2b 48->51 52 1f42b2c-1f42b39 GetProcAddress 48->52 53 1f42b6c-1f42b77 49->53 54 1f42b5b-1f42b6a 49->54 55 1f42bc0-1f42bc1 50->55 51->52 56 1f42b42 ExitProcess 52->56 57 1f42b3b-1f42b40 52->57 53->54 54->47 58 1f42bc5-1f42bc9 55->58 57->44 58->58 59 1f42bcb 58->59
                                        APIs
                                        • LoadLibraryA.KERNEL32(?), ref: 01F42B13
                                        • GetProcAddress.KERNELBASE(?,01F1CFF9), ref: 01F42B31
                                        • ExitProcess.KERNEL32(?,01F1CFF9), ref: 01F42B42
                                        • VirtualProtect.KERNELBASE(007F0000,00001000,00000004,?,00000000), ref: 01F42B90
                                        • VirtualProtect.KERNELBASE(007F0000,00001000), ref: 01F42BA5
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                        • String ID:
                                        • API String ID: 1996367037-0
                                        • Opcode ID: b4426a8895f4a276993f9d2c5052c8bb1ce0b6a76b17c812a6aed6cc869a2cb1
                                        • Instruction ID: 03bcf5dd786e42a02dbed445049c1b19f0b6c4bdc04c7f42e5879514b604a415
                                        • Opcode Fuzzy Hash: b4426a8895f4a276993f9d2c5052c8bb1ce0b6a76b17c812a6aed6cc869a2cb1
                                        • Instruction Fuzzy Hash: 4C510572A107129BD7318EBCECC0664BF95EB4123471C0738EEE2D73C6EBA5594A8760

                                        Control-flow Graph

                                        APIs
                                        • GetLastError.KERNEL32(01010388,0000000C), ref: 00EBB63E
                                        • RtlExitUserThread.NTDLL(00000000), ref: 00EBB645
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorExitLastThreadUser
                                        • String ID: hp"
                                        • API String ID: 1750398979-3535749429
                                        • Opcode ID: ed08ef55a65982a11742ecac4149bce95be1b1f0b092a86d06beb491153abf04
                                        • Instruction ID: 841b1aa14dce93aa22dd80278b323dbeffa89273934e622eb11714f8b37cbfcb
                                        • Opcode Fuzzy Hash: ed08ef55a65982a11742ecac4149bce95be1b1f0b092a86d06beb491153abf04
                                        • Instruction Fuzzy Hash: A0F0C2B1900204AFDB04AFB0D80ABAF7BB5EF40710F205189F412BB2A2CB745942CBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E642FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$DecryptMessage: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_DecryptMessage
                                        • API String ID: 689400697-3301108232
                                        • Opcode ID: bb121dd2a6c4b1445a9c346e9f2d6353547500ae03acaba78b371d28ee4eb8b7
                                        • Instruction ID: d27783f75f8fae3bf81d31eeeb2b4232268cea40249480d368e1192d6b219c52
                                        • Opcode Fuzzy Hash: bb121dd2a6c4b1445a9c346e9f2d6353547500ae03acaba78b371d28ee4eb8b7
                                        • Instruction Fuzzy Hash: 3B11AB753C43057BD6256957FD03EAB3EACEBC6BA1F0010A4FA10B52D1DA51CA50DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E643BE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EncryptMessage: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EncryptMessage
                                        • API String ID: 689400697-3976766517
                                        • Opcode ID: 38cece8b4311667905bea5cffd74ccc39b122a2fce3558825a311da355a7c62c
                                        • Instruction ID: 38f5f578feb294e951516538cd509e2b850d336079d7ac3720ee85a5fb7e6117
                                        • Opcode Fuzzy Hash: 38cece8b4311667905bea5cffd74ccc39b122a2fce3558825a311da355a7c62c
                                        • Instruction Fuzzy Hash: B71182763C43057BDA256D56FC03FAB3AACDBC1BA1F0010A4F910B52D1DD61CA50DBA1
                                        APIs
                                        • crypto_cert_fingerprint.GETSCREEN-456311346-X86(?), ref: 00E05E1C
                                          • Part of subcall function 00E0576E: crypto_cert_fingerprint_by_hash.GETSCREEN-456311346-X86(?,sha256), ref: 00E05779
                                        • crypto_cert_issuer.GETSCREEN-456311346-X86(?), ref: 00E05E30
                                        • crypto_cert_subject.GETSCREEN-456311346-X86(?,?), ref: 00E05E3A
                                        • certificate_data_new.GETSCREEN-456311346-X86(?,?,00000000,00000000,00000000,?,?), ref: 00E05E4A
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: certificate_data_newcrypto_cert_fingerprintcrypto_cert_fingerprint_by_hashcrypto_cert_issuercrypto_cert_subject
                                        • String ID:
                                        • API String ID: 1865246629-0
                                        • Opcode ID: b22f0af09afbb53f47c67a66392b01df666bde5d5b51faeba4ef9e6157e0229e
                                        • Instruction ID: 30436939fdccf6230c917d8607f5e821c45ada329eadacd6e00ca3c84f9e8d67
                                        • Opcode Fuzzy Hash: b22f0af09afbb53f47c67a66392b01df666bde5d5b51faeba4ef9e6157e0229e
                                        • Instruction Fuzzy Hash: 5EE0DF3A100608BFCF112F29CC05CAF3EEDDF853E4B184126BC0866162DA31CE919AA0
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00EAFDC9,00FDC654), ref: 00EAFCAE
                                        • UnhandledExceptionFilter.KERNEL32(00EAFDC9,?,00EAFDC9,00FDC654), ref: 00EAFCB7
                                        • GetCurrentProcess.KERNEL32(C0000409,?,00EAFDC9,00FDC654), ref: 00EAFCC2
                                        • TerminateProcess.KERNEL32(00000000,?,00EAFDC9,00FDC654), ref: 00EAFCC9
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                        • String ID:
                                        • API String ID: 3231755760-0
                                        • Opcode ID: 37b531d4bad9c99e3e493c117fb2fe0d4ea4a16e887588e7ec16d9b5cc6540bf
                                        • Instruction ID: 9ff56a0e09fc1acf0a7d1d8cec2772f6c4e8bc1237c6560285991fa5fdd50250
                                        • Opcode Fuzzy Hash: 37b531d4bad9c99e3e493c117fb2fe0d4ea4a16e887588e7ec16d9b5cc6540bf
                                        • Instruction Fuzzy Hash: 6BD0CAB2000208AFDB002BE2FD0CB6A3B28AB8861AF050010F31AB20E0CA314448CB61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 593 e67449-e6745b LoadLibraryA 594 e6745e-e678e4 GetProcAddress * 63 call e7001b 593->594 595 e6745d 593->595
                                        APIs
                                        • LoadLibraryA.KERNEL32(wtsapi32.dll,00E67168), ref: 00E6744E
                                        • GetProcAddress.KERNEL32(00000000,WTSStopRemoteControlSession), ref: 00E6746B
                                        • GetProcAddress.KERNEL32(WTSStartRemoteControlSessionW), ref: 00E6747D
                                        • GetProcAddress.KERNEL32(WTSStartRemoteControlSessionA), ref: 00E6748F
                                        • GetProcAddress.KERNEL32(WTSConnectSessionW), ref: 00E674A1
                                        • GetProcAddress.KERNEL32(WTSConnectSessionA), ref: 00E674B3
                                        • GetProcAddress.KERNEL32(WTSEnumerateServersW), ref: 00E674C5
                                        • GetProcAddress.KERNEL32(WTSEnumerateServersA), ref: 00E674D7
                                        • GetProcAddress.KERNEL32(WTSOpenServerW), ref: 00E674E9
                                        • GetProcAddress.KERNEL32(WTSOpenServerA), ref: 00E674FB
                                        • GetProcAddress.KERNEL32(WTSOpenServerExW), ref: 00E6750D
                                        • GetProcAddress.KERNEL32(WTSOpenServerExA), ref: 00E6751F
                                        • GetProcAddress.KERNEL32(WTSCloseServer), ref: 00E67531
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsW), ref: 00E67543
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsA), ref: 00E67555
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsExW), ref: 00E67567
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsExA), ref: 00E67579
                                        • GetProcAddress.KERNEL32(WTSEnumerateProcessesW), ref: 00E6758B
                                        • GetProcAddress.KERNEL32(WTSEnumerateProcessesA), ref: 00E6759D
                                        • GetProcAddress.KERNEL32(WTSTerminateProcess), ref: 00E675AF
                                        • GetProcAddress.KERNEL32(WTSQuerySessionInformationW), ref: 00E675C1
                                        • GetProcAddress.KERNEL32(WTSQuerySessionInformationA), ref: 00E675D3
                                        • GetProcAddress.KERNEL32(WTSQueryUserConfigW), ref: 00E675E5
                                        • GetProcAddress.KERNEL32(WTSQueryUserConfigA), ref: 00E675F7
                                        • GetProcAddress.KERNEL32(WTSSetUserConfigW), ref: 00E67609
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: WTSCloseServer$WTSConnectSessionA$WTSConnectSessionW$WTSCreateListenerA$WTSCreateListenerW$WTSDisconnectSession$WTSEnableChildSessions$WTSEnumerateListenersA$WTSEnumerateListenersW$WTSEnumerateProcessesA$WTSEnumerateProcessesExA$WTSEnumerateProcessesExW$WTSEnumerateProcessesW$WTSEnumerateServersA$WTSEnumerateServersW$WTSEnumerateSessionsA$WTSEnumerateSessionsExA$WTSEnumerateSessionsExW$WTSEnumerateSessionsW$WTSFreeMemory$WTSFreeMemoryExA$WTSFreeMemoryExW$WTSGetActiveConsoleSessionId$WTSGetChildSessionId$WTSGetListenerSecurityA$WTSGetListenerSecurityW$WTSIsChildSessionsEnabled$WTSLogoffSession$WTSOpenServerA$WTSOpenServerExA$WTSOpenServerExW$WTSOpenServerW$WTSQueryListenerConfigA$WTSQueryListenerConfigW$WTSQuerySessionInformationA$WTSQuerySessionInformationW$WTSQueryUserConfigA$WTSQueryUserConfigW$WTSQueryUserToken$WTSRegisterSessionNotification$WTSRegisterSessionNotificationEx$WTSSendMessageA$WTSSendMessageW$WTSSetListenerSecurityA$WTSSetListenerSecurityW$WTSSetUserConfigA$WTSSetUserConfigW$WTSShutdownSystem$WTSStartRemoteControlSessionA$WTSStartRemoteControlSessionW$WTSStopRemoteControlSession$WTSTerminateProcess$WTSUnRegisterSessionNotification$WTSUnRegisterSessionNotificationEx$WTSVirtualChannelClose$WTSVirtualChannelOpen$WTSVirtualChannelOpenEx$WTSVirtualChannelPurgeInput$WTSVirtualChannelPurgeOutput$WTSVirtualChannelQuery$WTSVirtualChannelRead$WTSVirtualChannelWrite$WTSWaitSystemEvent$wtsapi32.dll
                                        • API String ID: 2238633743-2998606599
                                        • Opcode ID: cbfd39a88a57cef235d23c5f4aafcf0e4644a4edebee276e03d50dcd1e405ca5
                                        • Instruction ID: fee486e95fc928605922c003919cc585b4aa5b86ba68e4a2a80c5daeb6bd1faa
                                        • Opcode Fuzzy Hash: cbfd39a88a57cef235d23c5f4aafcf0e4644a4edebee276e03d50dcd1e405ca5
                                        • Instruction Fuzzy Hash: B7B128B4DC4315AACB396F72BE4A886BEA7E7057703108836ED24563D8D7B580D0EF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 700 e514e3-e514fb 701 e51501-e51509 700->701 702 e516dd 700->702 701->702 703 e5150f-e51523 freerdp_error_info 701->703 704 e516df-e516e3 702->704 705 e516e4-e516f0 703->705 706 e51529-e5152f 703->706 708 e516f2-e516f9 call e5e717 705->708 709 e516fe-e5170a call e5e9a3 705->709 706->702 707 e51535-e5153c 706->707 710 e5154e-e5155a call e5e9a3 707->710 711 e5153e-e51549 call e5e717 707->711 708->709 718 e51710-e51736 call e5ed82 709->718 719 e5158e-e51595 709->719 723 e5155c-e51586 freerdp_get_error_info_string call e5ed82 710->723 724 e51589 710->724 711->710 718->719 719->702 725 e5159b-e515a3 719->725 723->724 724->719 728 e515a5-e515ad 725->728 729 e515b3-e515ba 725->729 728->702 728->729 730 e515bc-e515c3 call e5e717 729->730 731 e515c8-e515d4 call e5e9a3 729->731 730->731 737 e515d6-e515fd call e5ed82 731->737 738 e51600-e51609 freerdp_reconnect 731->738 737->738 740 e5160f-e5161c freerdp_get_last_error 738->740 741 e5173b-e5173e 738->741 743 e5161e-e51625 740->743 744 e5166b 740->744 741->704 746 e51627-e5162e call e5e717 743->746 747 e51633-e5163f call e5e9a3 743->747 745 e5166d-e51671 744->745 749 e51673-e5167a 745->749 750 e5167c-e51688 Sleep 745->750 746->747 755 e51667 747->755 756 e51641-e51664 call e5ed82 747->756 749->702 749->750 750->745 753 e5168a-e5168e 750->753 753->725 758 e51694-e5169b 753->758 755->744 756->755 760 e5169d-e516a4 call e5e717 758->760 761 e516a9-e516b5 call e5e9a3 758->761 760->761 761->702 767 e516b7-e516da call e5ed82 761->767 767->702
                                        APIs
                                        • freerdp_error_info.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E51519
                                        • freerdp_get_error_info_string.GETSCREEN-456311346-X86(00000000,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E5155D
                                        • freerdp_reconnect.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E51601
                                        • freerdp_get_last_error.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E51611
                                        • Sleep.KERNEL32(0000000A,?,?,?,?,?,?,00E514DF,?,00000000), ref: 00E5167E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Sleepfreerdp_error_infofreerdp_get_error_info_stringfreerdp_get_last_errorfreerdp_reconnect
                                        • String ID: Attempting reconnect (%u of %u)$Autoreconnect aborted by user$C:\Project\agent-windows\freerdp\FreeRDP\client\common\client.c$Disconnected by server hitting a bug or resource limit [%s]$Maximum reconnect retries exceeded$Network disconnect!$client_auto_reconnect_ex$com.freerdp.client.common
                                        • API String ID: 968149013-2963753137
                                        • Opcode ID: 3538ab4c8af45b5698131d06b1aa464ba28f8a85c95fba8e602e505131a88645
                                        • Instruction ID: 6bb4cc5dd8fdfe1f4430630b19cf997a96809ee9883e50d1292079a0bd8423f9
                                        • Opcode Fuzzy Hash: 3538ab4c8af45b5698131d06b1aa464ba28f8a85c95fba8e602e505131a88645
                                        • Instruction Fuzzy Hash: 4E513BB174430177EB286A24EC43F6E37A89B56B26F141879FD00FA1C5EAF1CAC88755

                                        Control-flow Graph

                                        APIs
                                        • gdi_get_pixel_format.GETSCREEN-456311346-X86(?,?,?,?,?,00E1A899,?,?,00000000,00000000,Function_006DAA7A), ref: 00E1A8B3
                                        • gdi_free.GETSCREEN-456311346-X86(?,?,?,?,?,00E1A899,?,?,00000000,00000000,Function_006DAA7A), ref: 00E1AA40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: gdi_freegdi_get_pixel_format
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\gdi\gdi.c$com.freerdp.gdi$failed to initialize gdi$gdi_init_ex
                                        • API String ID: 1251975138-534786182
                                        • Opcode ID: 94d5376f375e7f487623b766ad0b037d55404c7b5925ff13d9d5264dc09bfbb3
                                        • Instruction ID: d97876f2b3febf7b13f7770824f00529b975f3a0e68c918c28c89c931717a7b2
                                        • Opcode Fuzzy Hash: 94d5376f375e7f487623b766ad0b037d55404c7b5925ff13d9d5264dc09bfbb3
                                        • Instruction Fuzzy Hash: B741B5B1200701AFD715AF34DC42BA977E5FF44310F189439F998A6292EF71A990DB51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 826 de0e1f-de0e32 827 de0e34-de0e3b 826->827 828 de0e82-de0e8f call de1585 826->828 829 de0e4d-de0e59 call e5e9a3 827->829 830 de0e3d-de0e48 call e5e717 827->830 837 de0ee4-de0f8c call eb29c0 RtlEnterCriticalSection RtlLeaveCriticalSection 828->837 838 de0e91-de0e98 828->838 839 de0fdf-de0fe2 829->839 840 de0e5f-de0e7d 829->840 830->829 852 de0ede 837->852 857 de0f92-de0f99 837->857 842 de0eaa-de0eb6 call e5e9a3 838->842 843 de0e9a-de0ea5 call e5e717 838->843 846 de0ee0-de0ee3 839->846 847 de0fd7-de0fdc call e5ed82 840->847 842->852 853 de0eb8-de0edb call e5ed82 842->853 843->842 847->839 852->846 853->852 858 de0fab-de0fb7 call e5e9a3 857->858 859 de0f9b-de0fa6 call e5e717 857->859 858->839 865 de0fb9-de0fd1 858->865 859->858 865->847
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00DE0F64
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00DE0F79
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID: ,$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\client.c$PDRF$Skipping, channel already loaded$com.freerdp.core.client$error: channel export function call failed$error: too many channels$freerdp_channels_client_load_ex
                                        • API String ID: 3168844106-1571615648
                                        • Opcode ID: d65ecbbbdc760c3928f7bd766125d18708d5077ee84f4854461471854b8938c0
                                        • Instruction ID: d2f08f00a7c610a919212df012d5e40fe021061c490d5a876014d611b475af51
                                        • Opcode Fuzzy Hash: d65ecbbbdc760c3928f7bd766125d18708d5077ee84f4854461471854b8938c0
                                        • Instruction Fuzzy Hash: AC41B571A44306ABEB18EF6ADC42F997BE4EF08714F144429F614F7280D7B0E984DBA5

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00E66B05: InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0,00000000,00000000,00000000,?,00E1E59B,00000001,00006060,00000010), ref: 00E66B3E
                                        • GetVersionExA.KERNEL32(?), ref: 00E1E5CD
                                        • GetNativeSystemInfo.KERNEL32(?), ref: 00E1E5E7
                                        • RegOpenKeyExA.ADVAPI32(80000002,Software\FreeRDP\FreeRDP\RemoteFX,00000000,00020119,?), ref: 00E1E612
                                        • primitives_get.GETSCREEN-456311346-X86 ref: 00E1E6DC
                                        • CreateThreadpool.KERNEL32(00000000), ref: 00E1E6E2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CountCreateCriticalInfoInitializeNativeOpenSectionSpinSystemThreadpoolVersionprimitives_get
                                        • String ID: >$DGa?$Software\FreeRDP\FreeRDP\RemoteFX$com.freerdp.codec.rfx
                                        • API String ID: 3882483829-3600476205
                                        • Opcode ID: e682dc4e92ecb9ab69402a5f510209aa24957dc57c8d2e3fe550b8cde3631be6
                                        • Instruction ID: 8471738259f5943ad73c17bb4c0d5d0d6096c24287632bf13d9f961d6b74bb51
                                        • Opcode Fuzzy Hash: e682dc4e92ecb9ab69402a5f510209aa24957dc57c8d2e3fe550b8cde3631be6
                                        • Instruction Fuzzy Hash: AA41B2B1A00705AFEB149F65EC86BA6B7E8FF44304F10546EF909A6382DB70D984CB50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 948 e56c86-e56ca5 call ec35f0 951 e56ca7-e56caa 948->951 952 e56cdf-e56cef call ec35f0 948->952 953 e56cb0-e56cc5 951->953 954 e56d43 951->954 961 e56cf5-e56cfa 952->961 962 e56da3-e56db3 call ec35f0 952->962 956 e56cc7 953->956 957 e56cca-e56cdd call e5706d 953->957 958 e56d45-e56d49 954->958 956->957 957->958 961->954 964 e56cfc-e56d0b 961->964 970 e56e3d-e56e4d call ec35f0 962->970 971 e56db9-e56dbe 962->971 966 e57066-e57068 964->966 967 e56d11-e56d20 call eb5feb 964->967 966->958 967->954 975 e56d22-e56d3a call eb5ff6 967->975 980 e56e53-e56e58 970->980 981 e56faf-e56fbf call ec35f0 970->981 971->954 973 e56dc0-e56de0 call eb5feb 971->973 973->954 985 e56de6-e56def 973->985 986 e56d3c-e56d3d call eb5f15 975->986 987 e56d4a-e56d4d 975->987 980->954 982 e56e5e-e56e7e call eb5feb 980->982 981->954 995 e56fc5-e56fca 981->995 982->954 1002 e56e84-e56e89 982->1002 988 e56df1-e56dfc call ec3680 985->988 989 e56e19-e56e26 freerdp_device_collection_add 985->989 1000 e56d42 986->1000 996 e56d73 987->996 997 e56d4f-e56d60 call eb5ff6 987->997 1007 e56e16 988->1007 1008 e56dfe-e56e0f call eb5ff6 988->1008 989->966 998 e56e2c-e56e32 call eb5f15 989->998 995->954 1003 e56fd0-e56ff0 call eb5feb 995->1003 999 e56d75-e56d82 freerdp_device_collection_add 996->999 997->999 1019 e56d62-e56d6a call eb5f15 997->1019 1013 e56e37-e56e38 998->1013 999->966 1006 e56d88-e56da1 call eb5f15 * 3 999->1006 1000->954 1009 e56f5f-e56f62 1002->1009 1010 e56e8f-e56ea5 call eb5ff6 1002->1010 1003->954 1025 e56ff6-e56fff 1003->1025 1006->954 1007->989 1008->989 1029 e56e11 1008->1029 1017 e56f65-e56f78 freerdp_device_collection_add 1009->1017 1010->986 1030 e56eab-e56eae 1010->1030 1020 e56d6b-e56d71 call eb5f15 1013->1020 1017->966 1024 e56f7e-e56faa call eb5f15 * 5 1017->1024 1019->1020 1020->1000 1024->954 1032 e57001-e57017 call eb5ff6 1025->1032 1033 e5703d-e5704d freerdp_device_collection_add 1025->1033 1029->986 1030->1009 1038 e56eb4-e56eca call eb5ff6 1030->1038 1032->986 1050 e5701d-e57020 1032->1050 1033->966 1036 e5704f-e57061 call eb5f15 * 2 1033->1036 1036->966 1052 e56ecc-e56ed9 call eb5f15 1038->1052 1053 e56ede-e56ee1 1038->1053 1050->1033 1055 e57022-e57033 call eb5ff6 1050->1055 1052->1013 1053->1009 1059 e56ee3-e56ef9 call eb5ff6 1053->1059 1055->1033 1066 e57035 1055->1066 1069 e56f18-e56f1b 1059->1069 1070 e56efb-e56f12 call eb5f15 * 2 1059->1070 1066->1033 1069->1017 1073 e56f1d-e56f2e call eb5ff6 1069->1073 1070->1069 1073->1017 1079 e56f30-e56f5a call eb5f15 * 4 1073->1079 1079->954
                                        APIs
                                        • freerdp_device_collection_add.GETSCREEN-456311346-X86(?,?), ref: 00E56D79
                                        • freerdp_device_collection_add.GETSCREEN-456311346-X86(?,00000000), ref: 00E56E1D
                                        • freerdp_device_collection_add.GETSCREEN-456311346-X86(?,00000000), ref: 00E56F6F
                                        • freerdp_device_collection_add.GETSCREEN-456311346-X86(?,00000000), ref: 00E57044
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_device_collection_add
                                        • String ID: drive$parallel$printer$serial$smartcard
                                        • API String ID: 2538329621-807955808
                                        • Opcode ID: 4b43d88471fa57e5079e3c6671638d1607dffbed32f49ad2eae2922361a5258a
                                        • Instruction ID: 7f2c20b793b24d864cb934cebe15943cd125216390601609ab6eb8c8c0cb3d40
                                        • Opcode Fuzzy Hash: 4b43d88471fa57e5079e3c6671638d1607dffbed32f49ad2eae2922361a5258a
                                        • Instruction Fuzzy Hash: 77B1C1327086029BDF15AF18D841AAEBBF1EF04315B149869FC047F252EF72DD569B90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1088 de0c4d-de0c61 1089 de0c63-de0c6a 1088->1089 1090 de0cb1-de0cbf call de155c 1088->1090 1092 de0c7c-de0c88 call e5e9a3 1089->1092 1093 de0c6c-de0c77 call e5e717 1089->1093 1098 de0d15-de0dc4 call eb29c0 RtlEnterCriticalSection RtlLeaveCriticalSection 1090->1098 1099 de0cc1-de0cc8 1090->1099 1101 de0c8e-de0cac 1092->1101 1102 de0e17-de0e1a 1092->1102 1093->1092 1116 de0d0e 1098->1116 1118 de0dca-de0dd1 1098->1118 1104 de0cda-de0ce6 call e5e9a3 1099->1104 1105 de0cca-de0cd5 call e5e717 1099->1105 1106 de0e0f-de0e14 call e5ed82 1101->1106 1107 de0d10-de0d14 1102->1107 1104->1116 1117 de0ce8-de0d0b call e5ed82 1104->1117 1105->1104 1106->1102 1116->1107 1117->1116 1121 de0de3-de0def call e5e9a3 1118->1121 1122 de0dd3-de0dde call e5e717 1118->1122 1121->1102 1127 de0df1-de0e09 1121->1127 1122->1121 1127->1106
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00DE0D92
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00DE0DB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\client.c$PDRF$Skipping, channel already loaded$com.freerdp.core.client$error: channel export function call failed$error: too many channels$freerdp_channels_client_load
                                        • API String ID: 3168844106-4217659166
                                        • Opcode ID: f4b9a4b7bef36f58fb92813e6c76901a1e0d39af9f84771925da2d5baa197c89
                                        • Instruction ID: a8ffc478e93433c56363ebd0809311dbf1290ac6cbef7cee11183f1aa01613d3
                                        • Opcode Fuzzy Hash: f4b9a4b7bef36f58fb92813e6c76901a1e0d39af9f84771925da2d5baa197c89
                                        • Instruction Fuzzy Hash: 9451F571A00305BFEB28EF66DC42F597BE4EB44714F144429FA04BB280D7B0E984CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1128 ee58b8-ee58c9 1129 ee58cb-ee58d2 1128->1129 1130 ee5933-ee5957 audio_format_compatible 1128->1130 1133 ee58e4-ee58f0 call e5e9a3 1129->1133 1134 ee58d4-ee58df call e5e717 1129->1134 1131 ee595d-ee5964 1130->1131 1132 ee5959-ee595b 1130->1132 1136 ee5976-ee5982 call e5e9a3 1131->1136 1137 ee5966-ee5971 call e5e717 1131->1137 1135 ee59ac-ee59af 1132->1135 1144 ee59aa 1133->1144 1145 ee58f6-ee5931 audio_format_get_tag_string * 2 call e5ed82 1133->1145 1134->1133 1136->1144 1149 ee5984-ee59a7 call e5ed82 1136->1149 1137->1136 1144->1135 1145->1144 1149->1144
                                        APIs
                                        • audio_format_get_tag_string.GETSCREEN-456311346-X86(00000000,?,?,00EE5425,?,?,?,?,00000000,?), ref: 00EE58FA
                                        • audio_format_get_tag_string.GETSCREEN-456311346-X86(00000001,00000000,?,?,00EE5425,?,?,?,?,00000000,?), ref: 00EE5902
                                        • audio_format_compatible.GETSCREEN-456311346-X86(%T,?,?,?,?,00EE5425,?,?,?,?,00000000,?), ref: 00EE594D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: audio_format_get_tag_string$audio_format_compatible
                                        • String ID: %T$%s requires %s for sample input, got %s$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\dsp.c$Missing resample support, recompile -DWITH_SOXR=ON or -DWITH_DSP_FFMPEG=ON$com.freerdp.dsp$freerdp_dsp_resample
                                        • API String ID: 204136587-1473788660
                                        • Opcode ID: 0175b240b89b012f499e3555ad95aaac50268f4ad9114bdfc14134cd03db4bfd
                                        • Instruction ID: 4a4ef30bb2a282b721556808073cd017f09725296a4d6e4116276049ede42635
                                        • Opcode Fuzzy Hash: 0175b240b89b012f499e3555ad95aaac50268f4ad9114bdfc14134cd03db4bfd
                                        • Instruction Fuzzy Hash: B121DBB364434D79E7286E79AC43F7633D88F4072CF10141AFA14FA1C1ED51E9945269

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1153 ee3b76-ee3b91 freerdp_settings_set_bool 1154 ee3b97-ee3b9e 1153->1154 1155 ee3d20 1153->1155 1154->1155 1157 ee3ba4-ee3ba8 1154->1157 1156 ee3d22-ee3d26 1155->1156 1157->1155 1158 ee3bae-ee3bc1 freerdp_settings_set_string 1157->1158 1158->1155 1159 ee3bc7-ee3bcb 1158->1159 1160 ee3bcd-ee3bd0 1159->1160 1161 ee3bd2 1159->1161 1162 ee3bd5-ee3be5 freerdp_settings_set_string 1160->1162 1161->1162 1162->1155 1163 ee3beb-ee3bef 1162->1163 1164 ee3c0a-ee3c1c freerdp_settings_set_string 1163->1164 1165 ee3bf1-ee3c04 freerdp_settings_set_string 1163->1165 1164->1155 1166 ee3c22-ee3c35 freerdp_settings_set_string 1164->1166 1165->1155 1165->1164 1166->1155 1167 ee3c3b-ee3c4e freerdp_settings_set_string 1166->1167 1167->1155 1168 ee3c54-ee3c58 1167->1168 1169 ee3c5a-ee3c6a freerdp_settings_set_string 1168->1169 1170 ee3c70-ee3c8c freerdp_settings_set_uint32 1168->1170 1169->1155 1169->1170 1170->1155 1171 ee3c92-ee3ca4 freerdp_target_net_addresses_free 1170->1171 1172 ee3d1b-ee3d1e 1171->1172 1173 ee3ca6-ee3cd0 call eb5feb * 2 1171->1173 1172->1156 1173->1155 1178 ee3cd2-ee3cd4 1173->1178 1178->1155 1179 ee3cd6-ee3cde 1178->1179 1179->1172 1180 ee3ce0-ee3d10 call eb5ff6 1179->1180 1180->1155 1183 ee3d12-ee3d19 1180->1183 1183->1172 1183->1180
                                        APIs
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,00000400,00000001), ref: 00EE3B87
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000401,00000000), ref: 00EE3BB7
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000404,?), ref: 00EE3BDB
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000402,00000000), ref: 00EE3BFA
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000014,?), ref: 00EE3C12
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,000006C1,?), ref: 00EE3C2B
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000403,?), ref: 00EE3C44
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000015,00000000), ref: 00EE3C60
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(?,00000013,?), ref: 00EE3C82
                                        • freerdp_target_net_addresses_free.GETSCREEN-456311346-X86(?), ref: 00EE3C93
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_string$freerdp_settings_set_boolfreerdp_settings_set_uint32freerdp_target_net_addresses_free
                                        • String ID:
                                        • API String ID: 949014189-0
                                        • Opcode ID: 12f87a41451c66bc5c8156e90c5a793ed94ff3185f274a213cefdbc36b09d4f7
                                        • Instruction ID: ee3e00af7058056034ea48b4a9856d08492dab3e454d3697af5981f1cbaf7a28
                                        • Opcode Fuzzy Hash: 12f87a41451c66bc5c8156e90c5a793ed94ff3185f274a213cefdbc36b09d4f7
                                        • Instruction Fuzzy Hash: 1B41C471600A0EBBE7315F36DC49FA6B3A4FF04308F055025FB05A7691E772EA61CAA5
                                        APIs
                                          • Part of subcall function 00E65CD5: InitializeCriticalSectionAndSpinCount.KERNEL32(00000004,00000FA0,?,00000000,?,00E91701,00000001), ref: 00E65CF9
                                        • zgfx_context_new.GETSCREEN-456311346-X86(00000000), ref: 00E91874
                                          • Part of subcall function 00EE693A: zgfx_context_reset.GETSCREEN-456311346-X86(00000000,00000000,00000000,?,00E91879,00000000), ref: 00EE6964
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpinzgfx_context_newzgfx_context_reset
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\channels\rdpgfx\client\rdpgfx_main.c$Failed to acquire reference to WLog %s$HashTable_New failed!$calloc failed!$com.freerdp.channels.rdpgfx.client$rdpgfx_client_context_new$zgfx_context_new failed!
                                        • API String ID: 3732774510-3243565116
                                        • Opcode ID: d88e46b7716552c702e9bb6009ef949716e35c34c78aba319d6b971c7fe71ec0
                                        • Instruction ID: cdd02681824d817a9daabc36933c41336aa1e1c5c0caf96ea34efa4d55add886
                                        • Opcode Fuzzy Hash: d88e46b7716552c702e9bb6009ef949716e35c34c78aba319d6b971c7fe71ec0
                                        • Instruction Fuzzy Hash: 5C7113B1684B026AE7389F259C42F5673E4EB65724F14247AF514BBBC1EBB0E8408B85
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_APPENDER,00000000,00000000), ref: 00E5E8B2
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_APPENDER,00000000,00000000), ref: 00E5E8D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: %s environment variable modified in my back$BINARY$CONSOLE$FILE$UDP$WLOG_APPENDER
                                        • API String ID: 1431749950-225596728
                                        • Opcode ID: f467fabe270080f3dafab22a0595752676be7e8a0873ac4f789414a59acb37dc
                                        • Instruction ID: eea6bceb37ef318e3e9be291d048de48015d88e030ad280cafb9e0c9c563427c
                                        • Opcode Fuzzy Hash: f467fabe270080f3dafab22a0595752676be7e8a0873ac4f789414a59acb37dc
                                        • Instruction Fuzzy Hash: 02214D3324435628A66C32626C47EFB17DCCBC1735720283EFC04F52C1EE54D9449572
                                        APIs
                                        • freerdp_set_last_error_ex.GETSCREEN-456311346-X86(?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00DD2C14
                                        • clearChannelError.GETSCREEN-456311346-X86(?,?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00DD2C1B
                                          • Part of subcall function 00DD26E1: ResetEvent.KERNEL32(?), ref: 00DD270A
                                          • Part of subcall function 00DE8142: ResetEvent.KERNEL32(?,?,00DD2C27,?,?,?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00DE814E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EventReset$ChannelErrorclearfreerdp_set_last_error_ex
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c$ConnectionResult$DGa?$freerdp$freerdp_connect
                                        • API String ID: 3632380314-2935417829
                                        • Opcode ID: 7c0c77a84f6ce1cf4441f10c5912a4b9df3c7d21394f32ea3e3c005f52bcbebf
                                        • Instruction ID: 3da5c172900fc525c1e53ea94368d21cbe64efe708281ebf4b1b7bed3b3c4932
                                        • Opcode Fuzzy Hash: 7c0c77a84f6ce1cf4441f10c5912a4b9df3c7d21394f32ea3e3c005f52bcbebf
                                        • Instruction Fuzzy Hash: 3C319070600205AFE714EF79D885BAAB7E4FF18310F18007AE814EB395EB71DD548B61
                                        APIs
                                        • freerdp_set_last_error_ex.GETSCREEN-456311346-X86(?,?,rdp_set_error_info,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c,0000015B), ref: 00DE48D9
                                        • freerdp_set_last_error_ex.GETSCREEN-456311346-X86(?,00000000,rdp_set_error_info,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c,0000016A), ref: 00DE498F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_set_last_error_ex
                                        • String ID: %s missing context=%p$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c$ErrorInfo$com.freerdp.core.rdp$freerdp$rdp_set_error_info
                                        • API String ID: 270715978-29603548
                                        • Opcode ID: 5d29f7c4fff7084d2cf1709e9ddddcc5051b767ce08feb2d24e94f6adf9d6fe4
                                        • Instruction ID: 8170e51bf97e31097f98c6e0293c3d2ca9c5818593e8b27ae0eeec0b3a372e4a
                                        • Opcode Fuzzy Hash: 5d29f7c4fff7084d2cf1709e9ddddcc5051b767ce08feb2d24e94f6adf9d6fe4
                                        • Instruction Fuzzy Hash: 1021DB72A40301B6EB107B55DC42FEB7BA89B55B10F14406AFE187A2C2E7F0D640DEB6
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(01091278,Function_00068C90,00858EC0,00000000), ref: 00858F0A
                                        • GetLastError.KERNEL32 ref: 00858F38
                                        • TlsGetValue.KERNEL32 ref: 00858F46
                                        • SetLastError.KERNEL32(00000000), ref: 00858F4F
                                        • RtlAcquireSRWLockExclusive.NTDLL(01091284), ref: 00858F61
                                        • RtlReleaseSRWLockExclusive.NTDLL(01091284), ref: 00858F73
                                        • TlsSetValue.KERNEL32(00000000,?,?,00000000,0083B080), ref: 00858FB5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorExclusiveLastLockOnceValue$AcquireExecuteInitRelease
                                        • String ID: DGa?
                                        • API String ID: 389898287-2322070760
                                        • Opcode ID: 1f1a29ce9c547648d935e89e8bff31cb8d273a80b9ddb6b8fc75b0196dba3e82
                                        • Instruction ID: 88c9c2763f0b6e316ddacb0b7219a999e44428b107d711f0667b0adb175d5a32
                                        • Opcode Fuzzy Hash: 1f1a29ce9c547648d935e89e8bff31cb8d273a80b9ddb6b8fc75b0196dba3e82
                                        • Instruction Fuzzy Hash: CC21DEB1700209AFDB106FA5AC09BBF7BA5FB48712F000065FD15F6290DF329918CBA1
                                        APIs
                                        • LoadLibraryA.KERNEL32(secur32.dll,?,00E64AEC), ref: 00E64B18
                                        • LoadLibraryA.KERNEL32(security.dll,?,00E64AEC), ref: 00E64B28
                                        • GetProcAddress.KERNEL32(00000000,InitSecurityInterfaceW), ref: 00E64B42
                                        • GetProcAddress.KERNEL32(InitSecurityInterfaceA), ref: 00E64B51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: InitSecurityInterfaceA$InitSecurityInterfaceW$secur32.dll$security.dll
                                        • API String ID: 2574300362-4081094439
                                        • Opcode ID: f574d7fb1100db4f06bb4a4364dd2dac3b00fac38762a0bc4807e1416320d498
                                        • Instruction ID: 2467c9e3237dd056bababc375fa8cf4798c3c3f533fae5c779a758c63ed3ffad
                                        • Opcode Fuzzy Hash: f574d7fb1100db4f06bb4a4364dd2dac3b00fac38762a0bc4807e1416320d498
                                        • Instruction Fuzzy Hash: 8CF089B6D547265A8B35ABBAFC0095B7AE8ABC57943060173D810E33C4EA70C8418FA1
                                        APIs
                                        • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00E14320
                                        • GetFileSize.KERNEL32(00000000,?), ref: 00E1433A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: File$CreateSize
                                        • String ID: %s %hu %s %s %s
                                        • API String ID: 2791376181-2916857029
                                        • Opcode ID: 275bdb292b6cdbe6933e13543e6004b1ec56ab59eb21d013e557989ea26c9802
                                        • Instruction ID: acdf8f9519bb965fdd7aa53992615acb50d7e7de6788884712e359d10878b077
                                        • Opcode Fuzzy Hash: 275bdb292b6cdbe6933e13543e6004b1ec56ab59eb21d013e557989ea26c9802
                                        • Instruction Fuzzy Hash: 46514DF2900215AFEB159BA4EC45AFFB7FCEF05724B10512AF911F6281EB309A408B61
                                        APIs
                                        • gdi_CRgnToRect.GETSCREEN-456311346-X86(00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00E3E040
                                        • gdi_RgnToRect.GETSCREEN-456311346-X86(?,?,?,?,?), ref: 00E3E04F
                                        • gdi_CRgnToRect.GETSCREEN-456311346-X86(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00E3E062
                                        • gdi_RgnToRect.GETSCREEN-456311346-X86(?,?,?,?,?), ref: 00E3E0A3
                                        • gdi_CRgnToRect.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?,?,?), ref: 00E3E0C8
                                        • gdi_RectToCRgn.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E3E147
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Rectgdi_
                                        • String ID: DGa?
                                        • API String ID: 2404991910-2322070760
                                        • Opcode ID: 95c6ad67999f968c9c2cd369b71ff8dfc8617b848174309f54c67afd46f75198
                                        • Instruction ID: 96b8cc727f8e17f1b6ea72f0ea41667d137aa4c0e79bf67c46f0b7f01a2219bd
                                        • Opcode Fuzzy Hash: 95c6ad67999f968c9c2cd369b71ff8dfc8617b848174309f54c67afd46f75198
                                        • Instruction Fuzzy Hash: 2251BF72E01219AFCF14CF98C8858EEBBB9FF48710F24506AE515B7290D770AA41CFA0
                                        APIs
                                        • ber_read_universal_tag.GETSCREEN-456311346-X86(?,00000002,00000000), ref: 00DF502A
                                        • ber_read_length.GETSCREEN-456311346-X86(?,?), ref: 00DF503F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ber_read_lengthber_read_universal_tag
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\crypto\ber.c$ber_read_integer$com.freerdp.crypto$should implement reading an 8 bytes integer$should implement reading an integer with length=%d
                                        • API String ID: 3186670568-2454464461
                                        • Opcode ID: 36734cb21570665edcef819790e90f43234d63eec15ae6d0bc07f47e677e46ab
                                        • Instruction ID: 124a32fcb6c68544196f44fcc3d1fca5e374739040c6fbd40d6ed899f8758019
                                        • Opcode Fuzzy Hash: 36734cb21570665edcef819790e90f43234d63eec15ae6d0bc07f47e677e46ab
                                        • Instruction Fuzzy Hash: 04417BB1704B055BEB248E24EC82B3A37E59B93711F19C165FB94DA28DE634E900CB75
                                        APIs
                                        • region16_rects.GETSCREEN-456311346-X86(?,?), ref: 00E39C6E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: region16_rects
                                        • String ID: (%hu,%hu-%hu,%hu)$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\region.c$band %d: $com.freerdp.codec$nrects=%u$region16_print
                                        • API String ID: 844131241-2640574824
                                        • Opcode ID: 7bf2d74381e6accf357584660bc0956c7f8f6c89781f695cbcdbc9d0514b13f6
                                        • Instruction ID: 8a66054ec58b55bc3ba9c7fc81c24ee0315ce0081eab7a36f20c4ed4629b2044
                                        • Opcode Fuzzy Hash: 7bf2d74381e6accf357584660bc0956c7f8f6c89781f695cbcdbc9d0514b13f6
                                        • Instruction Fuzzy Hash: B73138B2780301B9FA38A664BD83F767AD8AB55B11F101425F910F61C1FBD2DE80D365
                                        APIs
                                        • ber_write_universal_tag.GETSCREEN-456311346-X86(?,00000002,00000000), ref: 00DF5415
                                        • ber_write_length.GETSCREEN-456311346-X86(?,00000001,?,00000002,00000000), ref: 00DF541D
                                        • ber_write_universal_tag.GETSCREEN-456311346-X86(?,00000002,00000000), ref: 00DF5440
                                        • ber_write_length.GETSCREEN-456311346-X86(?,00000002,?,00000002,00000000), ref: 00DF5448
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ber_write_lengthber_write_universal_tag
                                        • String ID:
                                        • API String ID: 1889070510-0
                                        • Opcode ID: 18ef3f9f5ae11241768caf1c4dc31a824dec3e3bd5586f49f269dacf6024e569
                                        • Instruction ID: 461baeccb03d8eab8afe0d870c592d00a69c3dddf3abcf7b05a2a087f50e117f
                                        • Opcode Fuzzy Hash: 18ef3f9f5ae11241768caf1c4dc31a824dec3e3bd5586f49f269dacf6024e569
                                        • Instruction Fuzzy Hash: 0821C531105F48AFDB126F04ED42B7A77A5EF11B01F06C459FB8A5FB86C261AA41CBB1
                                        APIs
                                        • glyph_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCB79
                                        • brush_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCB86
                                        • pointer_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCB94
                                        • bitmap_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCBA2
                                        • offscreen_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCBB0
                                        • palette_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCBBE
                                        • nine_grid_cache_new.GETSCREEN-456311346-X86(?), ref: 00DFCBCC
                                        • cache_free.GETSCREEN-456311346-X86(00000000), ref: 00DFCBDE
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: bitmap_cache_newbrush_cache_newcache_freeglyph_cache_newnine_grid_cache_newoffscreen_cache_newpalette_cache_newpointer_cache_new
                                        • String ID:
                                        • API String ID: 2332728789-0
                                        • Opcode ID: 42906154869710506a0c67ebba1e6bbb42983877cc0118c6e46d3c0bd67e0258
                                        • Instruction ID: b0ffd07b9bf7b51cbda64cc5f1151c4f790637e4843397a8b2905ebc05afc5ae
                                        • Opcode Fuzzy Hash: 42906154869710506a0c67ebba1e6bbb42983877cc0118c6e46d3c0bd67e0258
                                        • Instruction Fuzzy Hash: CD01083A154B0F5AE3246B759902D3B73E8CF4277071A943EE684E5981FF20D4018271
                                        APIs
                                        • region16_init.GETSCREEN-456311346-X86(?), ref: 00E1F58A
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: region16_init
                                        • String ID:
                                        • API String ID: 4140821900-0
                                        • Opcode ID: 3e8d829aa97f6b1ed1f2f2cf94f42bc771981313d169c183af5fd76dbc63c424
                                        • Instruction ID: ec1014923d3b5b3e80ed01098ad254f45aa481fb1460d3c00954727d1ab1e09e
                                        • Opcode Fuzzy Hash: 3e8d829aa97f6b1ed1f2f2cf94f42bc771981313d169c183af5fd76dbc63c424
                                        • Instruction Fuzzy Hash: 63515CB2D00219ABCB18DFA5C8859EEBBF9FF48304F10452AF519E7241E7359985CBA0
                                        APIs
                                        • freerdp_image_copy.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?,08008000,00000000,00000000,00000000,?,00000001,?,?), ref: 00E38C2B
                                        Strings
                                        • DGa?, xrefs: 00E38AFF
                                        • com.freerdp.color, xrefs: 00E38D98
                                        • freerdp_image_copy_from_icon_data, xrefs: 00E38DBA
                                        • 1bpp and 4bpp icons are not supported, xrefs: 00E38DB5
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c, xrefs: 00E38DBF
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_image_copy
                                        • String ID: 1bpp and 4bpp icons are not supported$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c$DGa?$com.freerdp.color$freerdp_image_copy_from_icon_data
                                        • API String ID: 1523062921-2754669059
                                        • Opcode ID: 9d4d6448644d0424abfdb071f0dc63182c1bad4e8f5f9bc3a9c3281c6a3f0854
                                        • Instruction ID: e10dace457dbc59b489e8bb08a4631d7855c66db3ed35d632b19499e7502cb47
                                        • Opcode Fuzzy Hash: 9d4d6448644d0424abfdb071f0dc63182c1bad4e8f5f9bc3a9c3281c6a3f0854
                                        • Instruction Fuzzy Hash: D351E5B2A00219AADF249F14CD55BFA7BE8EF48304F4491A9FD14B61C1D7708E84CF64
                                        APIs
                                        • gdi_CreateCompatibleDC.GETSCREEN-456311346-X86(?,00000000,?,?,?,00E1A9C7,00000000,?,?,?,?,?,?,?,?,00E1A899), ref: 00E1AAE7
                                        • gdi_CreateCompatibleBitmap.GETSCREEN-456311346-X86(?,?,?,00000000,?,?,?,00E1A9C7,00000000,?,?,?,?), ref: 00E1AB0E
                                        • gdi_CreateBitmapEx.GETSCREEN-456311346-X86(?,?,?,?,?,?,00000000,?,?,?,00E1A9C7,00000000,?,?,?,?), ref: 00E1AB2A
                                        • gdi_SelectObject.GETSCREEN-456311346-X86(?,?), ref: 00E1AB60
                                        • gdi_CreateRectRgn.GETSCREEN-456311346-X86(00000000,00000000,00000000,00000000), ref: 00E1ABA5
                                        • gdi_DeleteObject.GETSCREEN-456311346-X86(?), ref: 00E1AC39
                                        • gdi_DeleteDC.GETSCREEN-456311346-X86(?), ref: 00E1AC48
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: gdi_$Create$BitmapCompatibleDeleteObject$RectSelect
                                        • String ID:
                                        • API String ID: 412453062-0
                                        • Opcode ID: 63bcb7db3704573387d602035f9edcf4ce94fd8292c8b1d92a53da2faae9183a
                                        • Instruction ID: 369f836486f398dc17a43ec8dc3e549d9d734985e0e36e381b35e0ae2a0db17b
                                        • Opcode Fuzzy Hash: 63bcb7db3704573387d602035f9edcf4ce94fd8292c8b1d92a53da2faae9183a
                                        • Instruction Fuzzy Hash: B451F4752007059FC725DF28D885EA6BBE1FF18310B0945BDE98A9BB62E771E881CF40
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_PATH,00000000,00000000,00000000,?,?,?,?,?,00E66939,?,?,?,?,00E66A0A,?), ref: 00E6EABD
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_PATH,00000000,?,?,?,?,00E66939,?,?,?,?,00E66A0A,?,?,00000000), ref: 00E6EAE7
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_NAME,00000000,00000000,?,?,?,00E66939,?,?,?,?,00E66A0A,?,?,00000000), ref: 00E6EB14
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_NAME,00000000,?,?,?,?,00E66939,?,?,?,?,00E66A0A,?,?,00000000), ref: 00E6EB37
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WLOG_FILEAPPENDER_OUTPUT_FILE_NAME$WLOG_FILEAPPENDER_OUTPUT_FILE_PATH
                                        • API String ID: 1431749950-2760771567
                                        • Opcode ID: cd221c3a5fafff906cd99ac18318ab38b945dfd8ab1d3ab582e0a551c7bb949a
                                        • Instruction ID: 44ed949daa29eaaac9d7c7c8cd28db9a70504ab149fa2f3aff69463943978188
                                        • Opcode Fuzzy Hash: cd221c3a5fafff906cd99ac18318ab38b945dfd8ab1d3ab582e0a551c7bb949a
                                        • Instruction Fuzzy Hash: 8331D67AA40A167F87245BA5B94AE6FBFA8FB807E83101018F805B37C0DB709C14C7E1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: DGa?$kbd-lang-list$kbd-list$monitor-list
                                        • API String ID: 0-324577623
                                        • Opcode ID: 59bf575c661aab53d8bfe787af32115c3c424ffa0b15dfb25f9eb25c8ca2b6bb
                                        • Instruction ID: cf26dd922f8dd5a1544b94847bd4e3c538c367ce0be8ac9e0d21ada9283cf3e8
                                        • Opcode Fuzzy Hash: 59bf575c661aab53d8bfe787af32115c3c424ffa0b15dfb25f9eb25c8ca2b6bb
                                        • Instruction Fuzzy Hash: 97312632941218ABCB20EB68DE46DCBB7E8EB04364F0415A5FD58F31D2DA70DE44DAE1
                                        APIs
                                        • socket.WS2_32(00000002,00000002,00000011), ref: 00E6F673
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_UDP_TARGET,00000000,00000000,?,00E66921,?,?,?,?,00E66A0A,?,?,00000000,?,00E5E976,00000000), ref: 00E6F68A
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_UDP_TARGET,00000000,00000000,?,00E66921,?,?,?,?,00E66A0A,?,?,00000000,?,00E5E976,00000000), ref: 00E6F6AB
                                        • closesocket.WS2_32(?), ref: 00E6F6E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable$closesocketsocket
                                        • String ID: 127.0.0.1:20000$WLOG_UDP_TARGET
                                        • API String ID: 65193492-3368084233
                                        • Opcode ID: 7774be05bda8fa9cf0171fe3a65e004e409c15c105f0683acbdf3bf691d4a9c5
                                        • Instruction ID: bc85d5087c005b3fbee902f9629bdd3e8aaf7fc946189b9df31ee51d6bd9174e
                                        • Opcode Fuzzy Hash: 7774be05bda8fa9cf0171fe3a65e004e409c15c105f0683acbdf3bf691d4a9c5
                                        • Instruction Fuzzy Hash: 3321A772285B025FD3245F65FC0AB6B7BE4EF80798F20252DF142BA5E1DBB198058794
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(01091278,00858C90,00858EC0,00000000), ref: 00858E6A
                                        • GetLastError.KERNEL32 ref: 00858E7F
                                        • TlsGetValue.KERNEL32 ref: 00858E8D
                                        • SetLastError.KERNEL32(00000000), ref: 00858E96
                                        • TlsAlloc.KERNEL32 ref: 00858EC3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorLastOnce$AllocExecuteInitValue
                                        • String ID: DGa?
                                        • API String ID: 2822033501-2322070760
                                        • Opcode ID: efc1ff653c2fa6346dec622adf8a42265ceedcee3e1726caeb4711f7c8fe7193
                                        • Instruction ID: 5cd7e1ec70fd2e7ded8ed36b3a9cd436d6bd23a4df4187fb18a8de1f9f10f8b7
                                        • Opcode Fuzzy Hash: efc1ff653c2fa6346dec622adf8a42265ceedcee3e1726caeb4711f7c8fe7193
                                        • Instruction Fuzzy Hash: 4F01C875600209DFCB10AFB5EC49A7B77B8FB49721B400166FD55F7280EB356918CB50
                                        APIs
                                        • LoadLibraryA.KERNEL32(winsta.dll,?,00E678D9,01117120), ref: 00E70023
                                        • GetProcAddress.KERNEL32(00000000,WinStationVirtualOpen), ref: 00E7003C
                                        • GetProcAddress.KERNEL32(WinStationVirtualOpenEx), ref: 00E70052
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: WinStationVirtualOpen$WinStationVirtualOpenEx$winsta.dll
                                        • API String ID: 2238633743-2382846951
                                        • Opcode ID: 2cfa2f29dbd65787d45f2b744bd5528e8526f62ae58ad412d53d2748a78ab3b0
                                        • Instruction ID: 32b69e39702407b941c3bfaac5da665eb4171438ab034fe819b961ba58f201de
                                        • Opcode Fuzzy Hash: 2cfa2f29dbd65787d45f2b744bd5528e8526f62ae58ad412d53d2748a78ab3b0
                                        • Instruction Fuzzy Hash: 69015AB0502345DFC7149FB1A90FF623BE4AB84368F05A4B9E40DEB2A2EBB08454DF10
                                        APIs
                                        • glyph_cache_free.GETSCREEN-456311346-X86(?), ref: 00DFCB1E
                                        • brush_cache_free.GETSCREEN-456311346-X86(?,?), ref: 00DFCB26
                                        • pointer_cache_free.GETSCREEN-456311346-X86(?,?,?), ref: 00DFCB2E
                                        • bitmap_cache_free.GETSCREEN-456311346-X86(?,?,?,?), ref: 00DFCB36
                                        • offscreen_cache_free.GETSCREEN-456311346-X86(?,?,?,?,?), ref: 00DFCB3E
                                        • palette_cache_free.GETSCREEN-456311346-X86(?,?,?,?,?,?), ref: 00DFCB46
                                        • nine_grid_cache_free.GETSCREEN-456311346-X86(?,?,?,?,?,?,?), ref: 00DFCB4E
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: bitmap_cache_freebrush_cache_freeglyph_cache_freenine_grid_cache_freeoffscreen_cache_freepalette_cache_freepointer_cache_free
                                        • String ID:
                                        • API String ID: 637575458-0
                                        • Opcode ID: 7ad28be861358ee9bde9c91c788d2f392276a4a1cd27f1ec8984fa40b200d7dc
                                        • Instruction ID: 83de3c3d88fed34b4be5f7147f8d4e85688abd036436b9d609a446bc8799a7fd
                                        • Opcode Fuzzy Hash: 7ad28be861358ee9bde9c91c788d2f392276a4a1cd27f1ec8984fa40b200d7dc
                                        • Instruction Fuzzy Hash: 07E09B31001A18BBCA313F11DC03C6ABBE5EF007503019434F55631473CB12AC605EB0
                                        APIs
                                        • freerdp_settings_set_uint32.GETSCREEN-456311346-X86(?,000007C0,?), ref: 00E11DA2
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C8,00000001), ref: 00E11DCC
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C8,00000000), ref: 00E11DE8
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C9,00000000), ref: 00E11DFC
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C8,00000000), ref: 00E11E19
                                        • freerdp_settings_set_bool.GETSCREEN-456311346-X86(?,000007C9,00000000), ref: 00E11E2D
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_bool$freerdp_settings_set_uint32
                                        • String ID:
                                        • API String ID: 4272850885-0
                                        • Opcode ID: 3ea0a0162d7e9506aea58fcc0c8a3655e8c344f224c799a42870156a752d33d1
                                        • Instruction ID: f8763289a3bf4df7cbc9b193118eddb648a5e4de0918d08b4ad2652c0c54611b
                                        • Opcode Fuzzy Hash: 3ea0a0162d7e9506aea58fcc0c8a3655e8c344f224c799a42870156a752d33d1
                                        • Instruction Fuzzy Hash: 16112672F9A20675F96020A81C82FFF129C8F62B59F151065FF0CB50C5E982AE8084F6
                                        Strings
                                        • com.freerdp.codec, xrefs: 00E29AD0
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\interleaved.c, xrefs: 00E29AFA
                                        • interleaved_compress, xrefs: 00E29AF5
                                        • interleaved_compress: width (%u) or height (%u) is greater than 64, xrefs: 00E29AF0
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\interleaved.c$com.freerdp.codec$interleaved_compress$interleaved_compress: width (%u) or height (%u) is greater than 64
                                        • API String ID: 0-4054760794
                                        • Opcode ID: 2c3025f007e12810780489261eebf05877b05e840c482a44d70caa2ec03b9755
                                        • Instruction ID: d0b0ef4ff29df0d69cbf4a7b01aa762c29b214c73deb56f7aa6d848dfbc90aac
                                        • Opcode Fuzzy Hash: 2c3025f007e12810780489261eebf05877b05e840c482a44d70caa2ec03b9755
                                        • Instruction Fuzzy Hash: D421C5B2300318BFEF255E65FC46FAB3B99EB04758F082125F904B6192E671EC50DB50
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63DA3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$InitializeSecurityContextA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_InitializeSecurityContextA
                                        • API String ID: 689400697-1744466472
                                        • Opcode ID: b43d27a02e64b3855bd2d00826af0e9573d7b4891491f7309508452aceefcf4a
                                        • Instruction ID: 2dde4162ece75e4f1ceea61cf6cb4366d1377af0db38541cc54b562353e5180f
                                        • Opcode Fuzzy Hash: b43d27a02e64b3855bd2d00826af0e9573d7b4891491f7309508452aceefcf4a
                                        • Instruction Fuzzy Hash: C621AB362843047BDF251E56FD02DEB3FADEB85B50F041094FE04751E1D662CA60EB61
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63CC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$InitializeSecurityContextW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_InitializeSecurityContextW
                                        • API String ID: 689400697-743139187
                                        • Opcode ID: b2575a477b341063c303193b3a61ffe40f44a93fcd204d4dde4e0c48b6fc6ee7
                                        • Instruction ID: dd70e3b80e20591b70383b4616a6ea383e8ba3d2355b1c5651964a003139d43d
                                        • Opcode Fuzzy Hash: b2575a477b341063c303193b3a61ffe40f44a93fcd204d4dde4e0c48b6fc6ee7
                                        • Instruction Fuzzy Hash: C121DB722C03047BDF155E56EC03EEB3FA9EF95B94F041054FA00751D1D662DA60EBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6384E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcceptSecurityContext: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcceptSecurityContext
                                        • API String ID: 689400697-2008077614
                                        • Opcode ID: 02151954d58329d9bf924ee8393493ca76bf5563b245eaae9e46fdaef9fbba2e
                                        • Instruction ID: 9c60d91e23d7eeb7162c19f23a6d2930e8d653f597869ff6df667cf028be5a8b
                                        • Opcode Fuzzy Hash: 02151954d58329d9bf924ee8393493ca76bf5563b245eaae9e46fdaef9fbba2e
                                        • Instruction Fuzzy Hash: B511DA762843047BDF195E66FC07EEB3FA9EBD5B90F0010A4FA10762D1D661CA60DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E632F9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcquireCredentialsHandleA: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcquireCredentialsHandleA
                                        • API String ID: 689400697-1172745827
                                        • Opcode ID: 9f8855cf26922eb20c8e515ab23c29b1c36d313200c0ebde7b1075afd523edc5
                                        • Instruction ID: 8695fd81f64424b32c912c2eb6a3b2dccdc18fbb5e8c6f58c9d8b3c24cb88e35
                                        • Opcode Fuzzy Hash: 9f8855cf26922eb20c8e515ab23c29b1c36d313200c0ebde7b1075afd523edc5
                                        • Instruction Fuzzy Hash: 3E119D362C43057BDF252E66EC07EEB3FA9EBC5790F001094FA14752D1DA62CA60DBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63227
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcquireCredentialsHandleW: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcquireCredentialsHandleW
                                        • API String ID: 689400697-2657764935
                                        • Opcode ID: e0ceb40c97e8342a3ee6044e2ee7757cf5e8911ca5536a6161661dd6ffc05794
                                        • Instruction ID: 333d4473d14ecebd10f113f75fa57fd20dbce706749b2ad2a4ac9fcdec0dbe16
                                        • Opcode Fuzzy Hash: e0ceb40c97e8342a3ee6044e2ee7757cf5e8911ca5536a6161661dd6ffc05794
                                        • Instruction Fuzzy Hash: 4211E7362843047BDB151E62ED07EAB3BA9EB85754F0010A4FE00752E1D662CA60DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6417E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$SetContextAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_SetContextAttributesA
                                        • API String ID: 689400697-1164902870
                                        • Opcode ID: 2b9bd5a6c3e487e4a63bb3286f5a1592dd4be59a1c5b659ec6fb1c2dd406a9d2
                                        • Instruction ID: d8e5ef79f0bb60b56fa36c7bf9a148e56830afccf50d01fb3ebe31c6e5c8ed88
                                        • Opcode Fuzzy Hash: 2b9bd5a6c3e487e4a63bb3286f5a1592dd4be59a1c5b659ec6fb1c2dd406a9d2
                                        • Instruction Fuzzy Hash: 8311AB763C43057BDA256957BC07EA73EACDBD2BA1F0020A4F910B52D1D961CA90D7A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E640BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$SetContextAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_SetContextAttributesW
                                        • API String ID: 689400697-247170817
                                        • Opcode ID: d81e29a8eab7c558e65c8fb66757b048a50379d42f49176b1383ae362cfcc8a7
                                        • Instruction ID: e33326e463c7dace4aaa7e85b9f0b63cdd355a81f931bc1076fe0a1432ecf9b4
                                        • Opcode Fuzzy Hash: d81e29a8eab7c558e65c8fb66757b048a50379d42f49176b1383ae362cfcc8a7
                                        • Instruction Fuzzy Hash: BC11CD763C43057BDA256957FC03EA73EACDBD2B91F0050A4F910B52D1D951CE90D7A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E64544
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$VerifySignature: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_VerifySignature
                                        • API String ID: 689400697-1495805676
                                        • Opcode ID: a52ddb7aceaacde921dc8ca89b1c32f3553c963bb38497725bb2f22591dabb09
                                        • Instruction ID: edb45db15f2c03e4ede43e1daf4b2e6b2de210c00913538461572bfc9733a0a9
                                        • Opcode Fuzzy Hash: a52ddb7aceaacde921dc8ca89b1c32f3553c963bb38497725bb2f22591dabb09
                                        • Instruction Fuzzy Hash: 6C11EBB63C43007BDA256957BC07EA73FADDBC1B90F0010A4FA01B52D1D951CE50DBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E64481
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$MakeSignature: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_MakeSignature
                                        • API String ID: 689400697-3834539683
                                        • Opcode ID: f1faea2b845f191b41f74277d3a3000f9f7806de9fc7e8aa7e702a83b74a4ddf
                                        • Instruction ID: c043659e77455f7efaa4243f7ed7f329f0f1a56ae257f4e490282f01426cbe96
                                        • Opcode Fuzzy Hash: f1faea2b845f191b41f74277d3a3000f9f7806de9fc7e8aa7e702a83b74a4ddf
                                        • Instruction Fuzzy Hash: 8611C8753C43047BD6351956BD03FA73AACDBC1BA0F0050A4FA10B56D1DD51CA50DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6360B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImportSecurityContextA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImportSecurityContextA
                                        • API String ID: 689400697-848437295
                                        • Opcode ID: d165a0da26b0e277356a326eea8ec15f3834bffcf6515e7092698b314ca4d632
                                        • Instruction ID: 381576ec5da669b766c9d275912c93330334c005b63aa1a06e990193b88c633d
                                        • Opcode Fuzzy Hash: d165a0da26b0e277356a326eea8ec15f3834bffcf6515e7092698b314ca4d632
                                        • Instruction Fuzzy Hash: 2811E7763C43007BDA255966FD07EAB3FACDBC2BA0F0010A4F900B52D1DA61CB50DBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63548
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImportSecurityContextW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImportSecurityContextW
                                        • API String ID: 689400697-3257054040
                                        • Opcode ID: 33d53fec66acfae81268fee4845ee3f1a16fd6616db11a94b1b82df7477f5b21
                                        • Instruction ID: d4bbe94f58b490540d71c6dfe96200d8db89db89dbaa008adecf4af9a8b80026
                                        • Opcode Fuzzy Hash: 33d53fec66acfae81268fee4845ee3f1a16fd6616db11a94b1b82df7477f5b21
                                        • Instruction Fuzzy Hash: B611C8353C43007BD6252966FD07F673AACEBC1BD0F0010A4F911B62D1D951CB54DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E633CB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ExportSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ExportSecurityContext
                                        • API String ID: 689400697-3640258815
                                        • Opcode ID: 21b797150591583e1213f4f1266baab13efa167ce7727d3aad9bea0b609324a4
                                        • Instruction ID: 86339291d98ce2879c4454eeb354f494722348c433dc870fa201f393ccd89466
                                        • Opcode Fuzzy Hash: 21b797150591583e1213f4f1266baab13efa167ce7727d3aad9bea0b609324a4
                                        • Instruction Fuzzy Hash: FF1198753C43047AEA252A67BC07E6B7AACDBD1BD0F0050A4FA10B62D1DD61CB54DBA1
                                        APIs
                                        • ncrush_context_reset.GETSCREEN-456311346-X86(00000000,00000000), ref: 00E31B36
                                        Strings
                                        • com.freerdp.codec, xrefs: 00E31AF1
                                        • ncrush_context_new, xrefs: 00E31B14
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\ncrush.c, xrefs: 00E31B19
                                        • ncrush_context_new: failed to initialize tables, xrefs: 00E31B0F
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ncrush_context_reset
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\ncrush.c$com.freerdp.codec$ncrush_context_new$ncrush_context_new: failed to initialize tables
                                        • API String ID: 2838332675-904927664
                                        • Opcode ID: a806ddc9da2ffb415512c10a66e8e58a8783ea1e98f2465fe0119025518925d6
                                        • Instruction ID: 22555fa9c851b115ad4848b55417b6d66892e71893920f43fbef9acac4466c5e
                                        • Opcode Fuzzy Hash: a806ddc9da2ffb415512c10a66e8e58a8783ea1e98f2465fe0119025518925d6
                                        • Instruction Fuzzy Hash: 7511C8B32447027AE318AB25AC42FA7F7E8EB41754F10512DF518B6681EFB2E950C7E1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63F3E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryContextAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryContextAttributesA
                                        • API String ID: 689400697-3211427146
                                        • Opcode ID: d82e8b4ab3e004ba6e0cf5ab52d5c3059ad5006fa1d280d9a8decc2a9f41a270
                                        • Instruction ID: 3d9d605a8a6a25155f573cdacb87acdd97a2a1b48d17c738d31ca151d0758ff7
                                        • Opcode Fuzzy Hash: d82e8b4ab3e004ba6e0cf5ab52d5c3059ad5006fa1d280d9a8decc2a9f41a270
                                        • Instruction Fuzzy Hash: BE11C4357C8301BBD6252A66BC03EAB3EADDBC1BA0F0050A4F910B52D1D9A2CB50D7A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63E7E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryContextAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryContextAttributesW
                                        • API String ID: 689400697-2578917824
                                        • Opcode ID: 3eeaf422c454d29ab15d2cd81cc7c61cb3f79bcfe23f51ef35fb8e0893ff2440
                                        • Instruction ID: 52178872a8a40a1986fd87d2fc2be3383b821c587634ccf33573d503b611bc83
                                        • Opcode Fuzzy Hash: 3eeaf422c454d29ab15d2cd81cc7c61cb3f79bcfe23f51ef35fb8e0893ff2440
                                        • Instruction Fuzzy Hash: E911CA763C43007BDA355667BC03EAB3AACEBD2BA5F0010A5F914B52D1D962CB50D7B1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6378E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryCredentialsAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryCredentialsAttributesA
                                        • API String ID: 689400697-3754301720
                                        • Opcode ID: 4a435f5a69d6af655f5c34275c5ecfae742d31b43b8aa735f14bc991ff77ebbc
                                        • Instruction ID: 53e7b46e2c8f90393eafad746c5b6356ff818efb5624c7e0d10c5b9a3dd25b98
                                        • Opcode Fuzzy Hash: 4a435f5a69d6af655f5c34275c5ecfae742d31b43b8aa735f14bc991ff77ebbc
                                        • Instruction Fuzzy Hash: 0B110DB53C43007AE6241667FC07EAB7BACEBD1B91F0020A5FD10B52D1D961DB51DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E636CE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryCredentialsAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryCredentialsAttributesW
                                        • API String ID: 689400697-3413647607
                                        • Opcode ID: 46451f6da7d0e1f2bbf103b3b25f7f562ac5126883a205a4d2b7cf38ea148905
                                        • Instruction ID: 8e9634b9df16397052a446120745a1659f1013308727c755b2171820fabc21bf
                                        • Opcode Fuzzy Hash: 46451f6da7d0e1f2bbf103b3b25f7f562ac5126883a205a4d2b7cf38ea148905
                                        • Instruction Fuzzy Hash: D4110AB53C43007BE6251667FC07E6B7BACDBD2B90F0010A5F900B62D1D961DB50DBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63FFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityContextToken: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityContextToken
                                        • API String ID: 689400697-2156878011
                                        • Opcode ID: 5ddb65a79a45175d2bae02819fa946a9941874d41c8b9e5e3017334c70b83c97
                                        • Instruction ID: 06d4f24d3f24537e854db4fdcdcf64e9eaf97b4025cbd4ccd466ee8896ca069f
                                        • Opcode Fuzzy Hash: 5ddb65a79a45175d2bae02819fa946a9941874d41c8b9e5e3017334c70b83c97
                                        • Instruction Fuzzy Hash: 7B11E9793C43007BD6756567FC07FA73AACDBC2BA0F0050A4FA04B62D2D991CA50D7A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6316A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityPackageInfoA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityPackageInfoA
                                        • API String ID: 689400697-3351603741
                                        • Opcode ID: 01c7017f153d6c13998efd91667037f7e1171298a53fbc835e6c5acad39222c8
                                        • Instruction ID: 2a414001a8bea6edb7a0a957dd5e46181e89e743ca05eb6f98b617f65fe40806
                                        • Opcode Fuzzy Hash: 01c7017f153d6c13998efd91667037f7e1171298a53fbc835e6c5acad39222c8
                                        • Instruction Fuzzy Hash: 3E11E9753C83007AD6252667BD07EB73EACDBD2B61F0010A4FA00B62D2DA91DB50DBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E630AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityPackageInfoW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityPackageInfoW
                                        • API String ID: 689400697-2261828479
                                        • Opcode ID: bd3e309e46da99f0325010a6a12493d40715380ad09795af3870093498131ba0
                                        • Instruction ID: b1a0e5fb040974e4cfb875327f6ab37b8badc10866f242d64e8ef9151c80961b
                                        • Opcode Fuzzy Hash: bd3e309e46da99f0325010a6a12493d40715380ad09795af3870093498131ba0
                                        • Instruction Fuzzy Hash: 8711C6753C83003AE6246667BC07EB77AACDBC2BA4F0020A4F914B62D2D991CF5097B5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E62FF0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EnumerateSecurityPackagesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EnumerateSecurityPackagesA
                                        • API String ID: 689400697-1149382491
                                        • Opcode ID: 22a5c708b7a2e6ac03853f4816809bee1443dd0cdfaed9e403fc6c05f564609e
                                        • Instruction ID: 34f98a0556bdba05c91f024603587cce789755aff9aee8643345b61c6055c02e
                                        • Opcode Fuzzy Hash: 22a5c708b7a2e6ac03853f4816809bee1443dd0cdfaed9e403fc6c05f564609e
                                        • Instruction Fuzzy Hash: 0E11A3353C83007AE6342566FD07EAB7BADDBC2BA0F0060E4FA04B56D1D951CE5497A1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E62F33
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EnumerateSecurityPackagesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EnumerateSecurityPackagesW
                                        • API String ID: 689400697-255015424
                                        • Opcode ID: cb2038dc8eb0e09e42c68da1db321433d1415912117c9fa2a88fd52f2203eb94
                                        • Instruction ID: 77951c57781bb3d318a43465a4c49fe336059e8102da810706ed81e71eb074b9
                                        • Opcode Fuzzy Hash: cb2038dc8eb0e09e42c68da1db321433d1415912117c9fa2a88fd52f2203eb94
                                        • Instruction Fuzzy Hash: CF1106753C83003BD6242657BC07EA73EACDBD2BA0F0010A8FA14B62D1D951CA409BA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E639DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$CompleteAuthToken: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_CompleteAuthToken
                                        • API String ID: 689400697-1972714555
                                        • Opcode ID: bc43608ccc91a0abed6432db55dabf3c83779958a8cd5e0fe693df7de0f714f4
                                        • Instruction ID: 561e8ff2707970c565fa0a795789ebf9f91eda4573187689a6e9e67f8dc3fa79
                                        • Opcode Fuzzy Hash: bc43608ccc91a0abed6432db55dabf3c83779958a8cd5e0fe693df7de0f714f4
                                        • Instruction Fuzzy Hash: 4411AC753C43007BD6256567FD07EA77EACDBD1BA0F0010A4F910B66D1D951CB50EBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63920
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: ApplyControlToken: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_ApplyControlToken
                                        • API String ID: 689400697-2845897268
                                        • Opcode ID: fa98417fcfe083873c2b674f6c7d0ca99dea087fffa01017104b7ecdcba961a1
                                        • Instruction ID: 6417c199027f78a8862e58309d45a896e05f7c205cbf7a2063939eaea9b1a9b3
                                        • Opcode Fuzzy Hash: fa98417fcfe083873c2b674f6c7d0ca99dea087fffa01017104b7ecdcba961a1
                                        • Instruction Fuzzy Hash: F411A9753C43007AEA252567BD07EA77AACDBD2BE0F0014A8F900B66D5D9A1CF50DFA1
                                        APIs
                                        • freerdp_image_copy.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00E395B5
                                        Strings
                                        • SmartScaling requested but compiled without libcairo support!, xrefs: 00E395E6
                                        • com.freerdp.color, xrefs: 00E395C8
                                        • freerdp_image_scale, xrefs: 00E395EB
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c, xrefs: 00E395F0
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_image_copy
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c$SmartScaling requested but compiled without libcairo support!$com.freerdp.color$freerdp_image_scale
                                        • API String ID: 1523062921-212429655
                                        • Opcode ID: d8bf8da19b8a16a9ba2056f1710520407b23dae81e9a759662a7b6860a2d30b9
                                        • Instruction ID: ab4a462e10e21578b0a699749f0ebce772f68f8b049a1dc8b45dfa412b4e8e1e
                                        • Opcode Fuzzy Hash: d8bf8da19b8a16a9ba2056f1710520407b23dae81e9a759662a7b6860a2d30b9
                                        • Instruction Fuzzy Hash: 352103B234020DBBDF19DE50DD02FAD3BA9EB54704F005019FD14AA290E3B1DA90DB90
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E64241
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$RevertSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_RevertSecurityContext
                                        • API String ID: 689400697-954186549
                                        • Opcode ID: c833d1dc6b77d9d318e78e53bc6f46d5d3dfd099cf97ed15578ae34e36f82930
                                        • Instruction ID: c70eaa5329169b6776b21a2bda4f02c3af67d0952d859f7625939086106f71c3
                                        • Opcode Fuzzy Hash: c833d1dc6b77d9d318e78e53bc6f46d5d3dfd099cf97ed15578ae34e36f82930
                                        • Instruction Fuzzy Hash: FD11E5B53C43003BE6352557BC07FA73AACDBD2BA0F1020A5F900B66D1D991CE90DAA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63C0E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImpersonateSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImpersonateSecurityContext
                                        • API String ID: 689400697-4242683877
                                        • Opcode ID: 26fb325814344dcc9eaceb89f257fbd83ce2e051193677c1ffd483b40772e8c3
                                        • Instruction ID: 462408cb9a880fff7006908a1fddcb8c012246144ca8b3086a4d164a0020ccec
                                        • Opcode Fuzzy Hash: 26fb325814344dcc9eaceb89f257fbd83ce2e051193677c1ffd483b40772e8c3
                                        • Instruction Fuzzy Hash: 5911A1763C43007BE6252667BD07FA77EACDBD2BA0F0420A5F900B62D1D991CB50DAB1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63B54
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$FreeContextBuffer: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_FreeContextBuffer
                                        • API String ID: 689400697-1791514552
                                        • Opcode ID: 7f47a1ee984b6771ccf18f10e9d0e47c47e32eb16bd09abedb72b45c7d08f6c5
                                        • Instruction ID: 2d7b5f4ff001a67e3549e71d8a70912db773cd4e6a171f76c07cbca59e2c858e
                                        • Opcode Fuzzy Hash: 7f47a1ee984b6771ccf18f10e9d0e47c47e32eb16bd09abedb72b45c7d08f6c5
                                        • Instruction Fuzzy Hash: 2211A0753C43013BEA252567BC07EA73AACDBD2BA1F0020A8F900B62C1DD91CF409BA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E63A9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$DeleteSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_DeleteSecurityContext
                                        • API String ID: 689400697-4185332897
                                        • Opcode ID: a432c4533eda32ecf45d94e11d31162058b942ef0cb443d0447c51612b1d6250
                                        • Instruction ID: 9336914270dd52d0693e13843300952d21b6a09a2464dc56ed9e186e8894bc78
                                        • Opcode Fuzzy Hash: a432c4533eda32ecf45d94e11d31162058b942ef0cb443d0447c51612b1d6250
                                        • Instruction Fuzzy Hash: 8311E5753C43003AE6255667BD07EA77AACDBD2BA0F0020B8F904B62D1D991CB40EBA1
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(011170C8,00E64AA1,00000000,00000000), ref: 00E6348E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$FreeCredentialsHandle: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_FreeCredentialsHandle
                                        • API String ID: 689400697-3116451197
                                        • Opcode ID: 8e02f2ad0f7265cb51934fb4903b9a0c77e6cf1a3296531604f160fa7287e7d0
                                        • Instruction ID: 02b05dd8b2a868b89bb14aa82929d1eb433c5ee74152d28e5de7fd360ccbdd85
                                        • Opcode Fuzzy Hash: 8e02f2ad0f7265cb51934fb4903b9a0c77e6cf1a3296531604f160fa7287e7d0
                                        • Instruction Fuzzy Hash: 9B11A0663C43007AE6352566BC07E677AAC9BD2BE0F0060A4FA10B62C1DD91CA80DAA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: DGa?$audin$rdpsnd
                                        • API String ID: 0-231405756
                                        • Opcode ID: 6ac1729ec4dbc08763f120fc895001cc0356be666dc5af06c4862508135e36f4
                                        • Instruction ID: c60c1df860b272b07c567aa1400646e121bba859ffce5e191948eadc49633934
                                        • Opcode Fuzzy Hash: 6ac1729ec4dbc08763f120fc895001cc0356be666dc5af06c4862508135e36f4
                                        • Instruction Fuzzy Hash: 0711B631A04A16EFDB24CF25D880799F3A5BF04B46F15562AE89863141D7316DA4CFD1
                                        APIs
                                        • primitives_get.GETSCREEN-456311346-X86 ref: 00EE65CB
                                        Strings
                                        • com.freerdp.codec, xrefs: 00EE660B
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\yuv.c, xrefs: 00EE6633
                                        • error when decoding lines, xrefs: 00EE6629
                                        • yuv_process_work_callback, xrefs: 00EE662E
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: primitives_get
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\yuv.c$com.freerdp.codec$error when decoding lines$yuv_process_work_callback
                                        • API String ID: 2017034601-2620645302
                                        • Opcode ID: 5b592086a31e67e5b6af1ea060cae850668f8db5ec3c4dc6684bd29bb0e5228c
                                        • Instruction ID: 1fd8aa656813861260a1797a8db7797e020c6292e64864cf4854f18d69254792
                                        • Opcode Fuzzy Hash: 5b592086a31e67e5b6af1ea060cae850668f8db5ec3c4dc6684bd29bb0e5228c
                                        • Instruction Fuzzy Hash: C70184B160024ABFD728DF54DC02E5A77E8FF18758F004569F904EA291EAB1EA908B94
                                        APIs
                                        • region16_extents.GETSCREEN-456311346-X86(?), ref: 00E39F06
                                        • region16_extents.GETSCREEN-456311346-X86(?,?), ref: 00E39F12
                                        • region16_n_rects.GETSCREEN-456311346-X86(?,?,?), ref: 00E39F1D
                                        • region16_n_rects.GETSCREEN-456311346-X86(?), ref: 00E39F7D
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: region16_extentsregion16_n_rects
                                        • String ID:
                                        • API String ID: 2062899502-0
                                        • Opcode ID: a777aa3e440b79e1151d2e5a78892d79e860e14bb9abc1479bfd8844a7d2d6d9
                                        • Instruction ID: 69f91caea2264b4d67aee447bed70906809595123102eebc9f25a400aabc9790
                                        • Opcode Fuzzy Hash: a777aa3e440b79e1151d2e5a78892d79e860e14bb9abc1479bfd8844a7d2d6d9
                                        • Instruction Fuzzy Hash: 88512875A0012A9BCB14DF99C8458BEF7F5FF18310F15816AE859B7251E334AE80CBA0
                                        APIs
                                        • freerdp_settings_free.GETSCREEN-456311346-X86(00000000), ref: 00DE7326
                                          • Part of subcall function 00DE7F9B: GetComputerNameExA.KERNEL32(00000000,?,?,00000000), ref: 00DE7FCC
                                          • Part of subcall function 00DE7F9B: freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000680,?), ref: 00DE7FFC
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(00000000,00000086,?), ref: 00DE6D8C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_string$ComputerNamefreerdp_settings_free
                                        • String ID: C:\Windows\System32\mstscax.dll$DGa?
                                        • API String ID: 2334115954-2226006247
                                        • Opcode ID: a515a619c76a17891caf1429b2da46036e56b54465f2bf20aef15679e23137ea
                                        • Instruction ID: d0e20ba8a0d680c54b3678f51d204be31ac58941c10d2c77c1e3b380f431a6d4
                                        • Opcode Fuzzy Hash: a515a619c76a17891caf1429b2da46036e56b54465f2bf20aef15679e23137ea
                                        • Instruction Fuzzy Hash: B4E1C7B1505F409EE324DF39D885B93BBE4FF08311F50992EE5AE8B391D7B1A5808B58
                                        APIs
                                        • audio_format_print.GETSCREEN-456311346-X86(?,?,?), ref: 00EE4A72
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: audio_format_print
                                        • String ID: AUDIO_FORMATS (%hu) ={$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c$audio_formats_print
                                        • API String ID: 2744001552-3527835062
                                        • Opcode ID: b69c94f661f8dfdd42df8bbae77573d94b30b2215105e5312da0b2ff2128f516
                                        • Instruction ID: 3b9b7734f542691c7622bb54256602cfd94a3cbc71deef2f7e78cb8bd6becc3e
                                        • Opcode Fuzzy Hash: b69c94f661f8dfdd42df8bbae77573d94b30b2215105e5312da0b2ff2128f516
                                        • Instruction Fuzzy Hash: A61129B228031D33DB11AD265C42FBF2BAC9FA5B74F081415FE08B11D1FAA1D60093BA
                                        APIs
                                        • getChannelError.GETSCREEN-456311346-X86(?), ref: 00DE1248
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ChannelError
                                        • String ID: ($ChannelDetached$freerdp
                                        • API String ID: 1163697128-436519898
                                        • Opcode ID: aec81047aca3a7e6f9ae0b98a06152a80f697d00169d372d49396d9a0359f1ec
                                        • Instruction ID: 3896027541e05deda82a516eee874662b9fd5c92a0425d8f686e687bece6da2c
                                        • Opcode Fuzzy Hash: aec81047aca3a7e6f9ae0b98a06152a80f697d00169d372d49396d9a0359f1ec
                                        • Instruction Fuzzy Hash: 52216D75A00209AFDB00DF98CC85FAEBBF4FF08340F104469E944EB251D771AA549BA0
                                        APIs
                                        • getChannelError.GETSCREEN-456311346-X86(?), ref: 00DE0BB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ChannelError
                                        • String ID: ($ChannelAttached$freerdp
                                        • API String ID: 1163697128-2646891115
                                        • Opcode ID: 15eef9cf0a6e95e2cd42a3deb5775c99feea1b9a9f156158c24bc8b2f67b32f0
                                        • Instruction ID: 9fd5ab366472f6f6de33038eb698feacf2afbbaba3d4fe7cfddc660991f6d109
                                        • Opcode Fuzzy Hash: 15eef9cf0a6e95e2cd42a3deb5775c99feea1b9a9f156158c24bc8b2f67b32f0
                                        • Instruction Fuzzy Hash: 2A212D71A00209EFDB10DF99C885FAEBBF4FF08344F144569E948A7252D771AA90DBA1
                                        APIs
                                        • audio_format_get_tag_string.GETSCREEN-456311346-X86(?,?,?,?,?,?,?,?), ref: 00EE4737
                                        Strings
                                        • %s: wFormatTag: 0x%04hX nChannels: %hu nSamplesPerSec: %u nAvgBytesPerSec: %u nBlockAlign: %hu wBitsPerSample: %hu cbSize: %hu, xrefs: 00EE473E
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c, xrefs: 00EE4748
                                        • audio_format_print, xrefs: 00EE4743
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: audio_format_get_tag_string
                                        • String ID: %s: wFormatTag: 0x%04hX nChannels: %hu nSamplesPerSec: %u nAvgBytesPerSec: %u nBlockAlign: %hu wBitsPerSample: %hu cbSize: %hu$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c$audio_format_print
                                        • API String ID: 2866491501-3564663344
                                        • Opcode ID: 77acf7e2ef88f229e10e96b3bdbd509bef6c757bae6c82b87fb5334b70f2c502
                                        • Instruction ID: 440345081540eb48abd484f348dd16a0e0ab9240da2274fd2cff6d52299538b4
                                        • Opcode Fuzzy Hash: 77acf7e2ef88f229e10e96b3bdbd509bef6c757bae6c82b87fb5334b70f2c502
                                        • Instruction Fuzzy Hash: 4BF096B50402087ADB041F51CC02E3537ADEF48B15B248049FD1CAC1E1E777D9A2E360
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00E66F93
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00E66FC0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID: G$G
                                        • API String ID: 3168844106-3574868976
                                        • Opcode ID: 791fa75a28bdb13f0747db27a2ae01a24216ced037381166fd49f510852d1203
                                        • Instruction ID: 57fc5f8b69de35f7ff8522c78f26e7737835770a8dcec4f2cbbb3c3503a03859
                                        • Opcode Fuzzy Hash: 791fa75a28bdb13f0747db27a2ae01a24216ced037381166fd49f510852d1203
                                        • Instruction Fuzzy Hash: C9F03A352106068FD724DF5AE548AA7F3E9FF44364B50582DE58693960DB70F884CB80
                                        APIs
                                        • freerdp_get_last_error.GETSCREEN-456311346-X86(?), ref: 00DD2725
                                        • freerdp_set_last_error_ex.GETSCREEN-456311346-X86(?,0002000B,freerdp_abort_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,0000013A), ref: 00DD2745
                                        Strings
                                        • freerdp_abort_connect, xrefs: 00DD2739
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c, xrefs: 00DD2734
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_get_last_errorfreerdp_set_last_error_ex
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c$freerdp_abort_connect
                                        • API String ID: 3690923134-629580617
                                        • Opcode ID: 430f35d9f63700bceadd1c8d33bc45d112b64aa323f4c4b25dfc05c6f58a1948
                                        • Instruction ID: 7912ae387109876b17141189558ce825ba7e0c49fa567d178e6de14723a356cd
                                        • Opcode Fuzzy Hash: 430f35d9f63700bceadd1c8d33bc45d112b64aa323f4c4b25dfc05c6f58a1948
                                        • Instruction Fuzzy Hash: FAE0D831244211FAEA313D10EC02B65F794DF20BA0F180427B5C475291E6529952A6B2
                                        APIs
                                        • primitives_get.GETSCREEN-456311346-X86 ref: 00EE633F
                                        • primitives_flags.GETSCREEN-456311346-X86(00000000), ref: 00EE6353
                                        • TpWaitForWork.NTDLL(00000000,00000000), ref: 00EE64A9
                                        • TpReleaseWork.NTDLL(00000000), ref: 00EE64B2
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: Work$ReleaseWaitprimitives_flagsprimitives_get
                                        • String ID:
                                        • API String ID: 704174238-0
                                        • Opcode ID: 42b7b2415db7fd65b74c715b4cfe99c697feacfcb1a863900fd5e2ba7bfb7458
                                        • Instruction ID: 2f7fe294b43686a24c119c6aef612c49b081dd285dabcc25e1760e275aeac936
                                        • Opcode Fuzzy Hash: 42b7b2415db7fd65b74c715b4cfe99c697feacfcb1a863900fd5e2ba7bfb7458
                                        • Instruction Fuzzy Hash: 746124B5A0060A9FCB14DFA9C881AAEFBF5FF58350B14856AE819E7350D730E951CF90
                                        APIs
                                        • gdi_SetRgn.GETSCREEN-456311346-X86(?,?,?,?,00000000,00000001,?,?), ref: 00E3C324
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: gdi_
                                        • String ID:
                                        • API String ID: 2273374161-0
                                        • Opcode ID: 2ead09a44aba127efa6001147bae376ec00e50ab3ae76740fbfd5d3136eef1b6
                                        • Instruction ID: 5cb0644e02b06bd4d459725cce8ee2aee827be97f5f90fa96c079dbf75729514
                                        • Opcode Fuzzy Hash: 2ead09a44aba127efa6001147bae376ec00e50ab3ae76740fbfd5d3136eef1b6
                                        • Instruction Fuzzy Hash: 8B31B5B1A00209EFCB10DF98C9859AEBBF9FF48314F14906AE915F7211D334EA45CBA0
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00E65C16
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00E65C34
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00E65C54
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00E65C9A
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$Enter
                                        • String ID:
                                        • API String ID: 2978645861-0
                                        • Opcode ID: 52a745a3ea251d4f439f906085e0dc8fdd8609793b6ec2e39a4348e7baa87882
                                        • Instruction ID: cf909c7e6843a1f47bd0e1f2a4850bb057bc60fbbd4a659ef5aa1ef2ae614687
                                        • Opcode Fuzzy Hash: 52a745a3ea251d4f439f906085e0dc8fdd8609793b6ec2e39a4348e7baa87882
                                        • Instruction Fuzzy Hash: 9721AC72200B05EFDB20CF14E984A6AB7F4FB853A5F115429F882B7290E770AD81CB50
                                        APIs
                                          • Part of subcall function 00ECF42C: GetLastError.KERNEL32(00000000,?,00EB5FDD,00ECF0E3,?,?,00E5F77A,0000000C,?,?,?,?,00DD27D2,?,?,?), ref: 00ECF581
                                          • Part of subcall function 00ECF42C: SetLastError.KERNEL32(00000000,00000006), ref: 00ECF623
                                        • CloseHandle.KERNEL32(?,?,?,00EBB817,?,?,00EBB689,00000000), ref: 00EBB711
                                        • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,00EBB817,?,?,00EBB689,00000000), ref: 00EBB727
                                        • RtlExitUserThread.NTDLL(?,?,?,00EBB817,?,?,00EBB689,00000000), ref: 00EBB730
                                        • GetModuleHandleExW.KERNEL32(00000004,?,0000000C), ref: 00EBB76E
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorExitHandleLastThread$CloseFreeLibraryModuleUser
                                        • String ID:
                                        • API String ID: 1062721995-0
                                        • Opcode ID: 5c494b46703bdee4a5ce192e4a92bb2d05bc51d2a73cc50d1f59570d9bd2c29b
                                        • Instruction ID: 6071dc56eb7ee88a934799f5cf3b3f41c866120a4682bfa2b9121967da35e14e
                                        • Opcode Fuzzy Hash: 5c494b46703bdee4a5ce192e4a92bb2d05bc51d2a73cc50d1f59570d9bd2c29b
                                        • Instruction Fuzzy Hash: E71196B1500214AFC7209B66DC05EAB7BE9DFC1764F14922AF915B72A1DBB0DD05C690
                                        APIs
                                        • region16_rects.GETSCREEN-456311346-X86(?,00000000), ref: 00E39BDC
                                        • region16_extents.GETSCREEN-456311346-X86(?), ref: 00E39BEC
                                        • rectangles_intersects.GETSCREEN-456311346-X86(00000000,?), ref: 00E39BF7
                                          • Part of subcall function 00E397FD: rectangles_intersection.GETSCREEN-456311346-X86(?,?,?), ref: 00E3980C
                                        • rectangles_intersects.GETSCREEN-456311346-X86(00000000,?), ref: 00E39C1A
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: rectangles_intersects$rectangles_intersectionregion16_extentsregion16_rects
                                        • String ID:
                                        • API String ID: 3854534691-0
                                        • Opcode ID: 3ae0e6e2282d69f6a29daa640538588f82f3507cb970e478017c8bd43d05d967
                                        • Instruction ID: eaf2c07545d4090a2394e3065886c1a9d6160283dbfe47de91cf3fc671c175a4
                                        • Opcode Fuzzy Hash: 3ae0e6e2282d69f6a29daa640538588f82f3507cb970e478017c8bd43d05d967
                                        • Instruction Fuzzy Hash: 0E01F93311421969DB24DB55D8C9ABBFBDCDF40768F14701AFC98B6042EBB9EC81C1A4
                                        APIs
                                        • freerdp_new.GETSCREEN-456311346-X86 ref: 00E51F56
                                        • freerdp_context_new.GETSCREEN-456311346-X86(00000000,00000000,?,?), ref: 00E51FA4
                                        • freerdp_register_addin_provider.GETSCREEN-456311346-X86(?,00000000), ref: 00E51FC7
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_context_newfreerdp_newfreerdp_register_addin_provider
                                        • String ID:
                                        • API String ID: 3731710698-0
                                        • Opcode ID: 45781144f6ae13cbac860f93d878cd18322a80454d88ccccb3e40a44e9c24aa1
                                        • Instruction ID: 7e2bc0ef03cf0ca62d5bd4ca06ed7b2d108af4882d646c66abe36a5388578cea
                                        • Opcode Fuzzy Hash: 45781144f6ae13cbac860f93d878cd18322a80454d88ccccb3e40a44e9c24aa1
                                        • Instruction Fuzzy Hash: 0D119131608B026BC725AF66D801B97B7A5FF50325F10195EFC58A7340EB70E854C6A0
                                        APIs
                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0,?,?,?,00E66A0A,?,?,00000000,?,00E5E976,00000000), ref: 00E6697B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpin
                                        • String ID: %s: unknown handler type %u$WLog_Appender_New
                                        • API String ID: 2593887523-3466059274
                                        • Opcode ID: e76560077f0c62744d600d71edcbf461af9666849f118a206fc093fe70bd6f39
                                        • Instruction ID: 714f34ee127591ad922fa21f47209061984bc51f546e7953ad7b2f1677070b4e
                                        • Opcode Fuzzy Hash: e76560077f0c62744d600d71edcbf461af9666849f118a206fc093fe70bd6f39
                                        • Instruction Fuzzy Hash: 80112C361E8201669526797D7C4A9BF6BAC9BC3BF47147019FC05F6291DE31DC016352
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s-client.%s$DeviceServiceEntry
                                        • API String ID: 0-2733899524
                                        • Opcode ID: 8a6144311fb780f276972388d611889150873b83a6d9092c868840ae2e026497
                                        • Instruction ID: 0e04b7f6fcf9c3495848064149bd1beb98e0fefdfdacdf0c40d17bc34a760c8c
                                        • Opcode Fuzzy Hash: 8a6144311fb780f276972388d611889150873b83a6d9092c868840ae2e026497
                                        • Instruction Fuzzy Hash: 83118F72A00319ABAB119E99C881ABF7BACEF41B50F48401BFD14D7341D770DE418BA1
                                        APIs
                                        • region16_extents.GETSCREEN-456311346-X86(?), ref: 00DD54B0
                                        • region16_extents.GETSCREEN-456311346-X86(?), ref: 00DD54D5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: region16_extents
                                        • String ID: DGa?
                                        • API String ID: 1435106277-2322070760
                                        • Opcode ID: 4f9568ae00c6b9ba0ac4996a10ec34875fb6b654f9a2aa3510867b3d08ebd28f
                                        • Instruction ID: ae574eab0836bef5261112e4705070db85f8c14b260d741a5cbb351cdb35ca19
                                        • Opcode Fuzzy Hash: 4f9568ae00c6b9ba0ac4996a10ec34875fb6b654f9a2aa3510867b3d08ebd28f
                                        • Instruction Fuzzy Hash: 9611867590021D9FCB24DF68DD81AD9B7F4FB48310F1001A9DA48A7345DB71AE84CF90
                                        APIs
                                        • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000003,00000080,00000000), ref: 00E14060
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00E14076
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: File$CreatePointer
                                        • String ID: %s %hu %s %s %s
                                        • API String ID: 2024441833-2916857029
                                        • Opcode ID: cbb73cd5432e137a8a2b5712b8df72780c184f354b73149d18db2f2c73518b6d
                                        • Instruction ID: 22b09d4952f632912d83c7cd2691607a00e29dae55163ad53ed6d08b2af3f901
                                        • Opcode Fuzzy Hash: cbb73cd5432e137a8a2b5712b8df72780c184f354b73149d18db2f2c73518b6d
                                        • Instruction Fuzzy Hash: 5201F271101120BBCB212B62EC4AEA77F6DEF46374F148115FA18A91E2D722C952D6B0
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILTER,00000000,00000000,00000000,?,00E5E987), ref: 00E5EBF6
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILTER,00000000,00000000,?,?,00E5E987), ref: 00E5EC1A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WLOG_FILTER
                                        • API String ID: 1431749950-2006202657
                                        • Opcode ID: d0f7cf538d3ea6fa73025d3d53fbab53da5d84cbce1b866cc99c97859fd5f0ed
                                        • Instruction ID: ed823f7aadcf64f16b19832bc09b96aa30d5f2748232b59768278865b674cb48
                                        • Opcode Fuzzy Hash: d0f7cf538d3ea6fa73025d3d53fbab53da5d84cbce1b866cc99c97859fd5f0ed
                                        • Instruction Fuzzy Hash: 06F081333042152F46286721BD44C7FFFADD6C57A93100439F404F3140EB658C45C7A1
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WINPR_NATIVE_SSPI,00000000,00000000,?,?,00E64AE3), ref: 00E64BCC
                                        • GetEnvironmentVariableA.KERNEL32(WINPR_NATIVE_SSPI,00000000,00000000,?,?,00E64AE3), ref: 00E64BEC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WINPR_NATIVE_SSPI
                                        • API String ID: 1431749950-1020623567
                                        • Opcode ID: 2d50857699437bd177a03da0e9e8d10b9ac8be177e33e1174065f1e5d27b8c20
                                        • Instruction ID: 62c4c92056118b3113cfe675d7a043245e0e0244178d626e988c022d6b94ef03
                                        • Opcode Fuzzy Hash: 2d50857699437bd177a03da0e9e8d10b9ac8be177e33e1174065f1e5d27b8c20
                                        • Instruction Fuzzy Hash: D6F027F729A1322AE23532697C09FBF8E64CBC2FA4B242128F801F31C1CA40880395D2
                                        APIs
                                        • rfx_context_new.GETSCREEN-456311346-X86(?), ref: 00E2A2ED
                                          • Part of subcall function 00E1E4DD: GetVersionExA.KERNEL32(?), ref: 00E1E5CD
                                          • Part of subcall function 00E1E4DD: GetNativeSystemInfo.KERNEL32(?), ref: 00E1E5E7
                                          • Part of subcall function 00E1E4DD: RegOpenKeyExA.ADVAPI32(80000002,Software\FreeRDP\FreeRDP\RemoteFX,00000000,00020119,?), ref: 00E1E612
                                        • progressive_context_free.GETSCREEN-456311346-X86(00000000), ref: 00E2A36D
                                        Strings
                                        • com.freerdp.codec.progressive, xrefs: 00E2A2CA
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: InfoNativeOpenSystemVersionprogressive_context_freerfx_context_new
                                        • String ID: com.freerdp.codec.progressive
                                        • API String ID: 2699998398-3622116780
                                        • Opcode ID: 5ba3924b6794e24d542a2c683cd2c12f55333a389ef7c413f3d8d6bd4b9f3414
                                        • Instruction ID: 2a0d143d7f3946a56da903b73551763c3f446a8fa62614e99c64445b22ea03f1
                                        • Opcode Fuzzy Hash: 5ba3924b6794e24d542a2c683cd2c12f55333a389ef7c413f3d8d6bd4b9f3414
                                        • Instruction Fuzzy Hash: D6F0BB3360471116D224A775A801F5F67D8DF42B70F18103EF545B6581DA7094418265
                                        APIs
                                        • graphics_register_bitmap.GETSCREEN-456311346-X86(?,?,?), ref: 00E40077
                                        • graphics_register_glyph.GETSCREEN-456311346-X86(?,?,?,?,?), ref: 00E400B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: graphics_register_bitmapgraphics_register_glyph
                                        • String ID: DGa?
                                        • API String ID: 1787964235-2322070760
                                        • Opcode ID: 51041b4ecc6be9b8c6a7840a9edfe3a38e30e51b3b9f3d13b3a2ff59496f5f9c
                                        • Instruction ID: ae0a4253ce6976bdf67f8276c8e2cf044024a0704928b11e6f3b77b6f32b7da4
                                        • Opcode Fuzzy Hash: 51041b4ecc6be9b8c6a7840a9edfe3a38e30e51b3b9f3d13b3a2ff59496f5f9c
                                        • Instruction Fuzzy Hash: 9A11B7B0C0421CABDF20EFA5891A6DDBFF8AB85308F5051A9D41877202CBB05A49CF94
                                        APIs
                                        • freerdp_settings_get_key_for_name.GETSCREEN-456311346-X86(?), ref: 00E11EEF
                                        • freerdp_settings_get_type_for_key.GETSCREEN-456311346-X86(00000000), ref: 00E11F51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_get_key_for_namefreerdp_settings_get_type_for_key
                                        • String ID: TRUE
                                        • API String ID: 1888880752-3412697401
                                        • Opcode ID: b0018c061dc66bc6f0a5c1ae96b502b1e74c5eac103324a846d71ed7d750e117
                                        • Instruction ID: 914ef529de10c317ebc9f97e4743c0d9e6d460c205994b83c879ed22557f8aa4
                                        • Opcode Fuzzy Hash: b0018c061dc66bc6f0a5c1ae96b502b1e74c5eac103324a846d71ed7d750e117
                                        • Instruction Fuzzy Hash: B8E055323002187ADA215AAADC82DDB324DEF49FA5B0010A9F604B6541F760D98105A0
                                        APIs
                                        • GetComputerNameExA.KERNEL32(00000000,?,?,00000000), ref: 00DE7FCC
                                        • freerdp_settings_set_string.GETSCREEN-456311346-X86(?,00000680,?), ref: 00DE7FFC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ComputerNamefreerdp_settings_set_string
                                        • String ID: DGa?
                                        • API String ID: 1627475788-2322070760
                                        • Opcode ID: 59f35d139906feb6823dad57307e91909b0e2323a04bd9ed53b494948692f3ba
                                        • Instruction ID: 6d47b98f06cce8a8500015a939dabace7dfda0004fb7177aad640544130dd413
                                        • Opcode Fuzzy Hash: 59f35d139906feb6823dad57307e91909b0e2323a04bd9ed53b494948692f3ba
                                        • Instruction Fuzzy Hash: 64F04470A0416D9ADF10DB558C41BEEB7F89F18704F4100E6E585AA180DA71AEC89B55
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WTSAPI_LIBRARY,00000000,00000000,?,00E67163), ref: 00E67190
                                        • GetEnvironmentVariableA.KERNEL32(WTSAPI_LIBRARY,00000000,00000000,?,?,00E67163), ref: 00E671B1
                                          • Part of subcall function 00E67310: LoadLibraryA.KERNEL32(?,?,00E671C4,00000000,?,?,00E67163), ref: 00E67316
                                          • Part of subcall function 00E67310: GetProcAddress.KERNEL32(00000000,InitWtsApi), ref: 00E6732B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable$AddressLibraryLoadProc
                                        • String ID: WTSAPI_LIBRARY
                                        • API String ID: 3590464466-1122459656
                                        • Opcode ID: 7eab3bd15fef7b4539dc83490d61d087cccb7c3f4dbe0331fc4ed18572897954
                                        • Instruction ID: 8824828424cf8eaa5e5d376cd83021b621144d255ce44c90b03515abd5325b94
                                        • Opcode Fuzzy Hash: 7eab3bd15fef7b4539dc83490d61d087cccb7c3f4dbe0331fc4ed18572897954
                                        • Instruction Fuzzy Hash: D1E09B3218F53269D1352355BC0AFFF6B55DBC3BBDF20111AF440B61C49B549841C5A6
                                        APIs
                                        • LoadLibraryA.KERNEL32(?,?,00E671C4,00000000,?,?,00E67163), ref: 00E67316
                                        • GetProcAddress.KERNEL32(00000000,InitWtsApi), ref: 00E6732B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: InitWtsApi
                                        • API String ID: 2574300362-3428673357
                                        • Opcode ID: e5418a51d594950483fd05dcdc2d4721a5cf2ccd902b90676f679aced97631ae
                                        • Instruction ID: 98c6753e8e3af54fe012bbdcad875e6835dce6c1102bd5465483b0884c2a33ca
                                        • Opcode Fuzzy Hash: e5418a51d594950483fd05dcdc2d4721a5cf2ccd902b90676f679aced97631ae
                                        • Instruction Fuzzy Hash: EDD012716886059F9B14AFF2BC055267BED97406983045431E819D1294EB71C550E651
                                        APIs
                                        • GetLastError.KERNEL32(?,?,00EBB650,01010388,0000000C), ref: 00ECF430
                                        • SetLastError.KERNEL32(00000000), ref: 00ECF4D2
                                        • GetLastError.KERNEL32(00000000,?,00EB5FDD,00ECF0E3,?,?,00E5F77A,0000000C,?,?,?,?,00DD27D2,?,?,?), ref: 00ECF581
                                        • SetLastError.KERNEL32(00000000,00000006), ref: 00ECF623
                                          • Part of subcall function 00ECF066: HeapFree.KERNEL32(00000000,00000000,?,00EB5F2D,?,?,?,00E5FA9A,?,?,?,?,?,00DD293F,?,?), ref: 00ECF07C
                                          • Part of subcall function 00ECF066: GetLastError.KERNEL32(?,?,00EB5F2D,?,?,?,00E5FA9A,?,?,?,?,?,00DD293F,?,?), ref: 00ECF087
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.612671594873.00000000007F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007F0000, based on PE: true
                                        • Associated: 00000008.00000002.612671412990.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F74000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000000F7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000101B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000103F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000108C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001128000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.000000000130C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001311000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001D13000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001E7A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612671594873.0000000001F1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000008.00000002.612684745710.0000000001F43000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7f0000_getscreen-456311346-x86.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FreeHeap
                                        • String ID:
                                        • API String ID: 3197834085-0
                                        • Opcode ID: de6113fe2675255279355763dc4f3007680f49cd57bdff89a85cff1588e07c79
                                        • Instruction ID: 97d7bdd4827fc1fa1c44e3501d515c00758af5668f7239a34f38b489588690df
                                        • Opcode Fuzzy Hash: de6113fe2675255279355763dc4f3007680f49cd57bdff89a85cff1588e07c79
                                        • Instruction Fuzzy Hash: 2B41DE35505211BED7343E78AEC6F6B329AAF51764B2022B9FB20B61D1DB3B8D078250

                                        Execution Graph

                                        Execution Coverage:0.5%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:0%
                                        Total number of Nodes:77
                                        Total number of Limit Nodes:6
                                        execution_graph 12891 1c129e0 12892 1c129f8 12891->12892 12893 1c12b03 LoadLibraryA 12892->12893 12895 1c12b2c GetProcAddress 12892->12895 12896 1c12b48 VirtualProtect VirtualProtect 12892->12896 12893->12892 12895->12892 12897 1c12b42 ExitProcess 12895->12897 12898 1c12bc0 12896->12898 12899 b8b62b 12900 b8b637 12899->12900 12901 b8b64b 12900->12901 12902 b8b63e GetLastError RtlExitUserThread 12900->12902 12905 b9f42c GetLastError 12901->12905 12902->12901 12904 b8b650 12906 b9f442 12905->12906 12916 b9f44c SetLastError 12906->12916 12932 b9f717 12906->12932 12909 b9f4dc 12909->12904 12910 b9f479 12911 b9f4b9 12910->12911 12912 b9f481 12910->12912 12940 b9f25a 12911->12940 12936 b9f066 12912->12936 12913 b9f4e1 12920 b9f717 RtlAllocateHeap 12913->12920 12921 b9f4fe 12913->12921 12916->12909 12916->12913 12918 b9f503 12918->12904 12919 b9f066 2 API calls 12919->12916 12924 b9f522 12920->12924 12921->12918 12922 b9f57d GetLastError 12921->12922 12923 b9f593 12922->12923 12929 b9f622 SetLastError 12923->12929 12925 b9f52a 12924->12925 12926 b9f55e 12924->12926 12927 b9f066 2 API calls 12925->12927 12928 b9f25a 2 API calls 12926->12928 12927->12921 12930 b9f569 12928->12930 12929->12904 12931 b9f066 2 API calls 12930->12931 12931->12918 12935 b9f730 12932->12935 12933 b9f74f RtlAllocateHeap 12934 b9f764 12933->12934 12933->12935 12934->12910 12935->12933 12935->12934 12937 b9f071 HeapFree 12936->12937 12939 b9f093 12936->12939 12938 b9f086 GetLastError 12937->12938 12937->12939 12938->12939 12939->12916 12945 b9f0ee 12940->12945 12946 b9f0fa 12945->12946 12957 b8f2a5 RtlEnterCriticalSection 12946->12957 12948 b9f104 12958 b9f134 12948->12958 12951 b9f200 12952 b9f20c 12951->12952 12962 b8f2a5 RtlEnterCriticalSection 12952->12962 12954 b9f216 12963 b9f24e 12954->12963 12957->12948 12961 b8f2ed RtlLeaveCriticalSection 12958->12961 12960 b9f122 12960->12951 12961->12960 12962->12954 12966 b8f2ed RtlLeaveCriticalSection 12963->12966 12965 b9f23c 12965->12919 12966->12965 12967 b8b6e0 12969 b8b6eb 12967->12969 12968 b8b72d RtlExitUserThread 12970 b9f717 RtlAllocateHeap 12968->12970 12969->12968 12972 b8b717 12969->12972 12974 b8b710 CloseHandle 12969->12974 12971 b8b748 12970->12971 12973 b9f066 2 API calls 12971->12973 12972->12968 12978 b8b723 FreeLibraryAndExitThread 12972->12978 12975 b8b755 12973->12975 12974->12972 12976 b8b779 12975->12976 12977 b8b75c GetModuleHandleExW 12975->12977 12981 b8b6a9 12976->12981 12977->12976 12978->12968 12982 b8b6d9 12981->12982 12983 b8b6b5 12981->12983 12984 b8b6bb CloseHandle 12983->12984 12985 b8b6c4 12983->12985 12984->12985 12986 b8b6ca FreeLibrary 12985->12986 12987 b8b6d3 12985->12987 12986->12987 12988 b9f066 2 API calls 12987->12988 12988->12982

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 1c129e0-1c129f0 1 1c12a02-1c12a07 0->1 2 1c12a09 1->2 3 1c129f8-1c129fd 2->3 4 1c12a0b 2->4 5 1c129fe-1c12a00 3->5 6 1c12a10-1c12a12 4->6 5->1 5->2 7 1c12a14-1c12a19 6->7 8 1c12a1b-1c12a1f 6->8 7->8 9 1c12a21 8->9 10 1c12a2c-1c12a2f 8->10 11 1c12a23-1c12a2a 9->11 12 1c12a4b-1c12a50 9->12 13 1c12a31-1c12a36 10->13 14 1c12a38-1c12a3a 10->14 11->10 11->12 15 1c12a63-1c12a65 12->15 16 1c12a52-1c12a5b 12->16 13->14 14->6 19 1c12a67-1c12a6c 15->19 20 1c12a6e 15->20 17 1c12ad2-1c12ad5 16->17 18 1c12a5d-1c12a61 16->18 21 1c12ada 17->21 18->20 19->20 22 1c12a70-1c12a73 20->22 23 1c12a3c-1c12a3e 20->23 26 1c12adc-1c12ade 21->26 27 1c12a75-1c12a7a 22->27 28 1c12a7c 22->28 24 1c12a40-1c12a45 23->24 25 1c12a47-1c12a49 23->25 24->25 29 1c12a9d-1c12aac 25->29 30 1c12ae0-1c12ae3 26->30 31 1c12af7 26->31 27->28 28->23 32 1c12a7e-1c12a80 28->32 33 1c12abc-1c12ac9 29->33 34 1c12aae-1c12ab5 29->34 30->26 35 1c12ae5-1c12af5 30->35 36 1c12afd-1c12b01 31->36 37 1c12a82-1c12a87 32->37 38 1c12a89-1c12a8d 32->38 33->33 40 1c12acb-1c12acd 33->40 34->34 39 1c12ab7 34->39 35->21 41 1c12b03-1c12b19 LoadLibraryA 36->41 42 1c12b48-1c12b4b 36->42 37->38 38->32 43 1c12a8f 38->43 39->5 40->5 47 1c12b1a-1c12b1f 41->47 46 1c12b4e-1c12b55 42->46 44 1c12a91-1c12a98 43->44 45 1c12a9a 43->45 44->32 44->45 45->29 49 1c12b57-1c12b59 46->49 50 1c12b79-1c12bbd VirtualProtect * 2 46->50 47->36 48 1c12b21-1c12b23 47->48 51 1c12b25-1c12b2b 48->51 52 1c12b2c-1c12b39 GetProcAddress 48->52 53 1c12b5b-1c12b6a 49->53 54 1c12b6c-1c12b77 49->54 57 1c12bc0-1c12bc1 50->57 51->52 55 1c12b42 ExitProcess 52->55 56 1c12b3b-1c12b40 52->56 53->46 54->53 56->47 58 1c12bc5-1c12bc9 57->58 58->58 59 1c12bcb 58->59
                                        APIs
                                        • LoadLibraryA.KERNEL32(?), ref: 01C12B13
                                        • GetProcAddress.KERNELBASE(?,01BECFF9), ref: 01C12B31
                                        • ExitProcess.KERNEL32(?,01BECFF9), ref: 01C12B42
                                        • VirtualProtect.KERNELBASE(004C0000,00001000,00000004,?,00000000), ref: 01C12B90
                                        • VirtualProtect.KERNELBASE(004C0000,00001000), ref: 01C12BA5
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                        • String ID:
                                        • API String ID: 1996367037-0
                                        • Opcode ID: f34dd73c89d32ba123379a54efbeab55d59fa367999fce991bf338199ca4d8e5
                                        • Instruction ID: cd8805a75ba3b8b9ffdb7d3b58433c0b8aff0abfdcb6d2b21405844eb2914bee
                                        • Opcode Fuzzy Hash: f34dd73c89d32ba123379a54efbeab55d59fa367999fce991bf338199ca4d8e5
                                        • Instruction Fuzzy Hash: 3B510577690352DAD7318EBCCCC1664BB95EB432307380738D6E2D72CAE7A4D906A760

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00B9F42C: GetLastError.KERNEL32(00000000,?,00B85FDD,00B9F0E3,?,?,00B2F77A,0000000C,?,?,?,?,00AA27D2,?,?,?), ref: 00B9F581
                                          • Part of subcall function 00B9F42C: SetLastError.KERNEL32(00000000,00000006), ref: 00B9F623
                                        • CloseHandle.KERNEL32(?,?,?,00B8B817,?,?,00B8B689,00000000), ref: 00B8B711
                                        • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,00B8B817,?,?,00B8B689,00000000), ref: 00B8B727
                                        • RtlExitUserThread.NTDLL(?,?,?,00B8B817,?,?,00B8B689,00000000), ref: 00B8B730
                                        • GetModuleHandleExW.KERNEL32(00000004,?,0000000C), ref: 00B8B76E
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ErrorExitHandleLastThread$CloseFreeLibraryModuleUser
                                        • String ID:
                                        • API String ID: 1062721995-0
                                        • Opcode ID: f0651b4ce2e5ec9e21fc766cb599afb5e00fefbfe17f2347ebca1d9414246f86
                                        • Instruction ID: eefdea3334fbb7e38d2866eea0aa50aab81db1efc1dc0d938d157d87a5aa63c0
                                        • Opcode Fuzzy Hash: f0651b4ce2e5ec9e21fc766cb599afb5e00fefbfe17f2347ebca1d9414246f86
                                        • Instruction Fuzzy Hash: 72118EB5500305ABCB20AF65DC09EAA7BE8DFC4760F1485A5F956D72A1DB70DE01C7A0

                                        Control-flow Graph

                                        APIs
                                        • GetLastError.KERNEL32(00CE0388,0000000C), ref: 00B8B63E
                                        • RtlExitUserThread.NTDLL(00000000), ref: 00B8B645
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ErrorExitLastThreadUser
                                        • String ID:
                                        • API String ID: 1750398979-0
                                        • Opcode ID: 35ab0283433a77fc6926cc140c450298cf195b7ea558947d51442d8945e7c703
                                        • Instruction ID: f243ad521c8b358e728fbb54221b1edd59fd0f92c6b34764c51cdd7e427a1515
                                        • Opcode Fuzzy Hash: 35ab0283433a77fc6926cc140c450298cf195b7ea558947d51442d8945e7c703
                                        • Instruction Fuzzy Hash: 5EF0C271940604DFDF04BFB4C81AE6E7BB4EF45310F200598F001972A2DF349A41CBA5
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B343BE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EncryptMessage: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EncryptMessage
                                        • API String ID: 689400697-3976766517
                                        • Opcode ID: fc44653d886d9338854cdbdd070ff888c03d6a7d47286f6ca89b72e4800d3fcf
                                        • Instruction ID: 3c7f4fb4e56ea53f1d7972a6946999bf9485447b7f4cc46dfb44f76c55b0f719
                                        • Opcode Fuzzy Hash: fc44653d886d9338854cdbdd070ff888c03d6a7d47286f6ca89b72e4800d3fcf
                                        • Instruction Fuzzy Hash: B71182313843457FEB117E56EC43F673AACDB81B60F1000B5B904AA2E1DE61DA109774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B342FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$DecryptMessage: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_DecryptMessage
                                        • API String ID: 689400697-3301108232
                                        • Opcode ID: d5a15d90d27a5fa183711656468d14b837ca5fecd80da76a519134c410ec8b2b
                                        • Instruction ID: 296b433f9a47475da202c5ba1a6c567d85e11f657c2669924aa61ba28f920605
                                        • Opcode Fuzzy Hash: d5a15d90d27a5fa183711656468d14b837ca5fecd80da76a519134c410ec8b2b
                                        • Instruction Fuzzy Hash: 0F1198313843457BEB117A56FC83E6B3AACE795B60F1000B5B604AA1E1DA61DE50D778
                                        APIs
                                        • crypto_cert_fingerprint.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AD5E1C
                                          • Part of subcall function 00AD576E: crypto_cert_fingerprint_by_hash.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,sha256), ref: 00AD5779
                                        • crypto_cert_issuer.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AD5E30
                                        • crypto_cert_subject.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?), ref: 00AD5E3A
                                        • certificate_data_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,00000000,00000000,00000000,?,?), ref: 00AD5E4A
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: certificate_data_newcrypto_cert_fingerprintcrypto_cert_fingerprint_by_hashcrypto_cert_issuercrypto_cert_subject
                                        • String ID:
                                        • API String ID: 1865246629-0
                                        • Opcode ID: b22f0af09afbb53f47c67a66392b01df666bde5d5b51faeba4ef9e6157e0229e
                                        • Instruction ID: d6dc9b42057565bcd93f08a2a26d66dc7cb9c3e1e2d9fd0de60c3ece74896f80
                                        • Opcode Fuzzy Hash: b22f0af09afbb53f47c67a66392b01df666bde5d5b51faeba4ef9e6157e0229e
                                        • Instruction Fuzzy Hash: 41E09A36800608BA8F112F2ACD05C9F3EAEEF813A0B144126B8195A222EA318E1096A0
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00B7FDC9,00CAC654), ref: 00B7FCAE
                                        • UnhandledExceptionFilter.KERNEL32(00B7FDC9,?,00B7FDC9,00CAC654), ref: 00B7FCB7
                                        • GetCurrentProcess.KERNEL32(C0000409,?,00B7FDC9,00CAC654), ref: 00B7FCC2
                                        • TerminateProcess.KERNEL32(00000000,?,00B7FDC9,00CAC654), ref: 00B7FCC9
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                        • String ID:
                                        • API String ID: 3231755760-0
                                        • Opcode ID: 95b232a6c6a08b7dc2f990cfd88704cf70d1cd94e283a625193253801a7126c3
                                        • Instruction ID: 9563a18027d3f7f4370707071a1b8378f516802911f3c369dbd6266b65b10c83
                                        • Opcode Fuzzy Hash: 95b232a6c6a08b7dc2f990cfd88704cf70d1cd94e283a625193253801a7126c3
                                        • Instruction Fuzzy Hash: DAD0CA32010208ABDB042BE0FD2DF8A3B38AB0C60BF250000F30A87260CF3146008B61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 631 b37449-b3745b LoadLibraryA 632 b3745e-b378e4 GetProcAddress * 63 call b4001b 631->632 633 b3745d 631->633
                                        APIs
                                        • LoadLibraryA.KERNEL32(wtsapi32.dll,00B37168), ref: 00B3744E
                                        • GetProcAddress.KERNEL32(00000000,WTSStopRemoteControlSession), ref: 00B3746B
                                        • GetProcAddress.KERNEL32(WTSStartRemoteControlSessionW), ref: 00B3747D
                                        • GetProcAddress.KERNEL32(WTSStartRemoteControlSessionA), ref: 00B3748F
                                        • GetProcAddress.KERNEL32(WTSConnectSessionW), ref: 00B374A1
                                        • GetProcAddress.KERNEL32(WTSConnectSessionA), ref: 00B374B3
                                        • GetProcAddress.KERNEL32(WTSEnumerateServersW), ref: 00B374C5
                                        • GetProcAddress.KERNEL32(WTSEnumerateServersA), ref: 00B374D7
                                        • GetProcAddress.KERNEL32(WTSOpenServerW), ref: 00B374E9
                                        • GetProcAddress.KERNEL32(WTSOpenServerA), ref: 00B374FB
                                        • GetProcAddress.KERNEL32(WTSOpenServerExW), ref: 00B3750D
                                        • GetProcAddress.KERNEL32(WTSOpenServerExA), ref: 00B3751F
                                        • GetProcAddress.KERNEL32(WTSCloseServer), ref: 00B37531
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsW), ref: 00B37543
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsA), ref: 00B37555
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsExW), ref: 00B37567
                                        • GetProcAddress.KERNEL32(WTSEnumerateSessionsExA), ref: 00B37579
                                        • GetProcAddress.KERNEL32(WTSEnumerateProcessesW), ref: 00B3758B
                                        • GetProcAddress.KERNEL32(WTSEnumerateProcessesA), ref: 00B3759D
                                        • GetProcAddress.KERNEL32(WTSTerminateProcess), ref: 00B375AF
                                        • GetProcAddress.KERNEL32(WTSQuerySessionInformationW), ref: 00B375C1
                                        • GetProcAddress.KERNEL32(WTSQuerySessionInformationA), ref: 00B375D3
                                        • GetProcAddress.KERNEL32(WTSQueryUserConfigW), ref: 00B375E5
                                        • GetProcAddress.KERNEL32(WTSQueryUserConfigA), ref: 00B375F7
                                        • GetProcAddress.KERNEL32(WTSSetUserConfigW), ref: 00B37609
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: WTSCloseServer$WTSConnectSessionA$WTSConnectSessionW$WTSCreateListenerA$WTSCreateListenerW$WTSDisconnectSession$WTSEnableChildSessions$WTSEnumerateListenersA$WTSEnumerateListenersW$WTSEnumerateProcessesA$WTSEnumerateProcessesExA$WTSEnumerateProcessesExW$WTSEnumerateProcessesW$WTSEnumerateServersA$WTSEnumerateServersW$WTSEnumerateSessionsA$WTSEnumerateSessionsExA$WTSEnumerateSessionsExW$WTSEnumerateSessionsW$WTSFreeMemory$WTSFreeMemoryExA$WTSFreeMemoryExW$WTSGetActiveConsoleSessionId$WTSGetChildSessionId$WTSGetListenerSecurityA$WTSGetListenerSecurityW$WTSIsChildSessionsEnabled$WTSLogoffSession$WTSOpenServerA$WTSOpenServerExA$WTSOpenServerExW$WTSOpenServerW$WTSQueryListenerConfigA$WTSQueryListenerConfigW$WTSQuerySessionInformationA$WTSQuerySessionInformationW$WTSQueryUserConfigA$WTSQueryUserConfigW$WTSQueryUserToken$WTSRegisterSessionNotification$WTSRegisterSessionNotificationEx$WTSSendMessageA$WTSSendMessageW$WTSSetListenerSecurityA$WTSSetListenerSecurityW$WTSSetUserConfigA$WTSSetUserConfigW$WTSShutdownSystem$WTSStartRemoteControlSessionA$WTSStartRemoteControlSessionW$WTSStopRemoteControlSession$WTSTerminateProcess$WTSUnRegisterSessionNotification$WTSUnRegisterSessionNotificationEx$WTSVirtualChannelClose$WTSVirtualChannelOpen$WTSVirtualChannelOpenEx$WTSVirtualChannelPurgeInput$WTSVirtualChannelPurgeOutput$WTSVirtualChannelQuery$WTSVirtualChannelRead$WTSVirtualChannelWrite$WTSWaitSystemEvent$wtsapi32.dll
                                        • API String ID: 2238633743-2998606599
                                        • Opcode ID: a884be3977176f7db55ebed5663da65e9f8f3af8e36649653115519355815d1e
                                        • Instruction ID: 2c6b3251aeffc2e5c9b20e453810d04a4804f6e1efa6d88444c09473631ad4ae
                                        • Opcode Fuzzy Hash: a884be3977176f7db55ebed5663da65e9f8f3af8e36649653115519355815d1e
                                        • Instruction Fuzzy Hash: AEB126B4D48395AACB91BF72FCCA8563EA1E70577830468AAE809DE370D7754050DFB8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 738 b214e3-b214fb 739 b21501-b21509 738->739 740 b216dd 738->740 739->740 741 b2150f-b21523 freerdp_error_info 739->741 742 b216df-b216e3 740->742 743 b216e4-b216f0 741->743 744 b21529-b2152f 741->744 746 b216f2-b216f9 call b2e717 743->746 747 b216fe-b2170a call b2e9a3 743->747 744->740 745 b21535-b2153c 744->745 749 b2154e-b2155a call b2e9a3 745->749 750 b2153e-b21549 call b2e717 745->750 746->747 756 b21710-b21736 call b2ed82 747->756 757 b2158e-b21595 747->757 762 b21589 749->762 763 b2155c-b21586 freerdp_get_error_info_string call b2ed82 749->763 750->749 756->757 757->740 760 b2159b-b215a3 757->760 764 b215b3-b215ba 760->764 765 b215a5-b215ad 760->765 762->757 763->762 768 b215c8-b215d4 call b2e9a3 764->768 769 b215bc-b215c3 call b2e717 764->769 765->740 765->764 775 b21600-b21609 freerdp_reconnect 768->775 776 b215d6-b215fd call b2ed82 768->776 769->768 778 b2173b-b2173e 775->778 779 b2160f-b2161c freerdp_get_last_error 775->779 776->775 778->742 781 b2166b 779->781 782 b2161e-b21625 779->782 785 b2166d-b21671 781->785 783 b21633-b2163f call b2e9a3 782->783 784 b21627-b2162e call b2e717 782->784 794 b21641-b21664 call b2ed82 783->794 795 b21667 783->795 784->783 788 b21673-b2167a 785->788 789 b2167c-b21688 Sleep 785->789 788->740 788->789 789->785 790 b2168a-b2168e 789->790 790->760 793 b21694-b2169b 790->793 797 b216a9-b216b5 call b2e9a3 793->797 798 b2169d-b216a4 call b2e717 793->798 794->795 795->781 797->740 805 b216b7-b216da call b2ed82 797->805 798->797 805->740
                                        APIs
                                        • freerdp_error_info.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?,00B214DF,?,00000000), ref: 00B21519
                                        • freerdp_get_error_info_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,?,?,?,?,?,?,00B214DF,?,00000000), ref: 00B2155D
                                        • freerdp_reconnect.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?,00B214DF,?,00000000), ref: 00B21601
                                        • freerdp_get_last_error.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?,00B214DF,?,00000000), ref: 00B21611
                                        • Sleep.KERNEL32(0000000A,?,?,?,?,?,?,00B214DF,?,00000000), ref: 00B2167E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Sleepfreerdp_error_infofreerdp_get_error_info_stringfreerdp_get_last_errorfreerdp_reconnect
                                        • String ID: Attempting reconnect (%u of %u)$Autoreconnect aborted by user$C:\Project\agent-windows\freerdp\FreeRDP\client\common\client.c$Disconnected by server hitting a bug or resource limit [%s]$Maximum reconnect retries exceeded$Network disconnect!$client_auto_reconnect_ex$com.freerdp.client.common
                                        • API String ID: 968149013-2963753137
                                        • Opcode ID: bedf55218fc8a9cd2313e9791922e7e464495928e5b393213cb5d85f792310ea
                                        • Instruction ID: e7c9ca888c3544dc8911374df020cdaf60f48480017c11a0b60de97fda6bf770
                                        • Opcode Fuzzy Hash: bedf55218fc8a9cd2313e9791922e7e464495928e5b393213cb5d85f792310ea
                                        • Instruction Fuzzy Hash: 8451F67274032567EB227B29FC83F6A26E8DB75BA0F1448B9F51CEE1C1DB70C9414624

                                        Control-flow Graph

                                        APIs
                                        • gdi_get_pixel_format.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,00AEA899,?,?,00000000,00000000,Function_006DAA7A), ref: 00AEA8B3
                                        • gdi_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,00AEA899,?,?,00000000,00000000,Function_006DAA7A), ref: 00AEAA40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: gdi_freegdi_get_pixel_format
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\gdi\gdi.c$com.freerdp.gdi$failed to initialize gdi$gdi_init_ex
                                        • API String ID: 1251975138-534786182
                                        • Opcode ID: 9f2a9b34b471446d5bee92db2add64685978c3d34468e53804aa8e31ec4a38b1
                                        • Instruction ID: 897896cae72b54e69154075c33e1678f35030f99cfb8141aa8e951c782d9e6ba
                                        • Opcode Fuzzy Hash: 9f2a9b34b471446d5bee92db2add64685978c3d34468e53804aa8e31ec4a38b1
                                        • Instruction Fuzzy Hash: 47417A71200702ABDB14BF26DD42BAA77E5BF14350F148439F55C9B2A2EF31E851CB61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 864 ab0e1f-ab0e32 865 ab0e82-ab0e8f call ab1585 864->865 866 ab0e34-ab0e3b 864->866 873 ab0e91-ab0e98 865->873 874 ab0ee4-ab0f8c call b829c0 RtlEnterCriticalSection RtlLeaveCriticalSection 865->874 868 ab0e4d-ab0e59 call b2e9a3 866->868 869 ab0e3d-ab0e48 call b2e717 866->869 879 ab0fdf-ab0fe2 868->879 880 ab0e5f-ab0e7d 868->880 869->868 877 ab0eaa-ab0eb6 call b2e9a3 873->877 878 ab0e9a-ab0ea5 call b2e717 873->878 892 ab0ede 874->892 894 ab0f92-ab0f99 874->894 891 ab0eb8-ab0edb call b2ed82 877->891 877->892 878->877 885 ab0ee0-ab0ee3 879->885 886 ab0fd7-ab0fdc call b2ed82 880->886 886->879 891->892 892->885 896 ab0fab-ab0fb7 call b2e9a3 894->896 897 ab0f9b-ab0fa6 call b2e717 894->897 896->879 903 ab0fb9-ab0fd1 896->903 897->896 903->886
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00AB0F64
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00AB0F79
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID: ,$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\client.c$PDRF$Skipping, channel already loaded$com.freerdp.core.client$error: channel export function call failed$error: too many channels$freerdp_channels_client_load_ex
                                        • API String ID: 3168844106-1571615648
                                        • Opcode ID: ac023ba0c98af3e0bb8774114583f8a7348f7468a1ddaf5c311380e7d8ff616b
                                        • Instruction ID: 1bbcd1d7e37ba80e083d8a93f25e852ed1ee19831940cfe66fcb915763fadf2a
                                        • Opcode Fuzzy Hash: ac023ba0c98af3e0bb8774114583f8a7348f7468a1ddaf5c311380e7d8ff616b
                                        • Instruction Fuzzy Hash: DF418571A44305AADB249F65EC86FAA77FCEF08714F104429F618FB291DB70E9408B64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 947 b26c86-b26ca5 call b935f0 950 b26ca7-b26caa 947->950 951 b26cdf-b26cef call b935f0 947->951 953 b26d43 950->953 954 b26cb0-b26cc5 950->954 960 b26da3-b26db3 call b935f0 951->960 961 b26cf5-b26cfa 951->961 955 b26d45-b26d49 953->955 957 b26cc7 954->957 958 b26cca-b26cdd call b2706d 954->958 957->958 958->955 968 b26db9-b26dbe 960->968 969 b26e3d-b26e4d call b935f0 960->969 961->953 964 b26cfc-b26d0b 961->964 966 b26d11-b26d20 call b85feb 964->966 967 b27066-b27068 964->967 966->953 975 b26d22-b26d3a call b85ff6 966->975 967->955 968->953 971 b26dc0-b26de0 call b85feb 968->971 979 b26e53-b26e58 969->979 980 b26faf-b26fbf call b935f0 969->980 971->953 982 b26de6-b26def 971->982 988 b26d4a-b26d4d 975->988 989 b26d3c-b26d3d call b85f15 975->989 979->953 984 b26e5e-b26e7e call b85feb 979->984 980->953 992 b26fc5-b26fca 980->992 986 b26df1-b26dfc call b93680 982->986 987 b26e19-b26e26 freerdp_device_collection_add 982->987 984->953 1000 b26e84-b26e89 984->1000 1005 b26e16 986->1005 1006 b26dfe-b26e0f call b85ff6 986->1006 987->967 995 b26e2c-b26e32 call b85f15 987->995 993 b26d73 988->993 994 b26d4f-b26d60 call b85ff6 988->994 999 b26d42 989->999 992->953 1001 b26fd0-b26ff0 call b85feb 992->1001 1004 b26d75-b26d82 freerdp_device_collection_add 993->1004 994->1004 1018 b26d62-b26d6a call b85f15 994->1018 1011 b26e37-b26e38 995->1011 999->953 1007 b26f5f-b26f62 1000->1007 1008 b26e8f-b26ea5 call b85ff6 1000->1008 1001->953 1024 b26ff6-b26fff 1001->1024 1004->967 1012 b26d88-b26da1 call b85f15 * 3 1004->1012 1005->987 1006->987 1028 b26e11 1006->1028 1016 b26f65-b26f78 freerdp_device_collection_add 1007->1016 1008->989 1029 b26eab-b26eae 1008->1029 1019 b26d6b-b26d71 call b85f15 1011->1019 1012->953 1016->967 1023 b26f7e-b26faa call b85f15 * 5 1016->1023 1018->1019 1019->999 1023->953 1031 b27001-b27017 call b85ff6 1024->1031 1032 b2703d-b2704d freerdp_device_collection_add 1024->1032 1028->989 1029->1007 1037 b26eb4-b26eca call b85ff6 1029->1037 1031->989 1049 b2701d-b27020 1031->1049 1032->967 1035 b2704f-b27061 call b85f15 * 2 1032->1035 1035->967 1051 b26ede-b26ee1 1037->1051 1052 b26ecc-b26ed9 call b85f15 1037->1052 1049->1032 1054 b27022-b27033 call b85ff6 1049->1054 1051->1007 1058 b26ee3-b26ef9 call b85ff6 1051->1058 1052->1011 1054->1032 1066 b27035 1054->1066 1067 b26efb-b26f12 call b85f15 * 2 1058->1067 1068 b26f18-b26f1b 1058->1068 1066->1032 1067->1068 1068->1016 1071 b26f1d-b26f2e call b85ff6 1068->1071 1071->1016 1078 b26f30-b26f5a call b85f15 * 4 1071->1078 1078->953
                                        APIs
                                        • freerdp_device_collection_add.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?), ref: 00B26D79
                                        • freerdp_device_collection_add.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000000), ref: 00B26E1D
                                        • freerdp_device_collection_add.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000000), ref: 00B26F6F
                                        • freerdp_device_collection_add.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000000), ref: 00B27044
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_device_collection_add
                                        • String ID: drive$parallel$printer$serial$smartcard
                                        • API String ID: 2538329621-807955808
                                        • Opcode ID: 7c2962bbbc4a8d1d53651380874ea0ca480307b76ce387d7908fca4bc5605732
                                        • Instruction ID: fcdbd1ca78825c5f4f4c18960da1814fe8e951d18b41d6708738ae8ddbd33e51
                                        • Opcode Fuzzy Hash: 7c2962bbbc4a8d1d53651380874ea0ca480307b76ce387d7908fca4bc5605732
                                        • Instruction Fuzzy Hash: DBB1A0316086269BDF25BF18E84195E7BE1EF08354B2580F9F9089F262EF32DD51CB94

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1087 ab0c4d-ab0c61 1088 ab0c63-ab0c6a 1087->1088 1089 ab0cb1-ab0cbf call ab155c 1087->1089 1090 ab0c7c-ab0c88 call b2e9a3 1088->1090 1091 ab0c6c-ab0c77 call b2e717 1088->1091 1098 ab0cc1-ab0cc8 1089->1098 1099 ab0d15-ab0dc4 call b829c0 RtlEnterCriticalSection RtlLeaveCriticalSection 1089->1099 1100 ab0c8e-ab0cac 1090->1100 1101 ab0e17-ab0e1a 1090->1101 1091->1090 1103 ab0cda-ab0ce6 call b2e9a3 1098->1103 1104 ab0cca-ab0cd5 call b2e717 1098->1104 1114 ab0d0e 1099->1114 1118 ab0dca-ab0dd1 1099->1118 1106 ab0e0f-ab0e14 call b2ed82 1100->1106 1107 ab0d10-ab0d14 1101->1107 1113 ab0ce8-ab0d0b call b2ed82 1103->1113 1103->1114 1104->1103 1106->1101 1113->1114 1114->1107 1120 ab0de3-ab0def call b2e9a3 1118->1120 1121 ab0dd3-ab0dde call b2e717 1118->1121 1120->1101 1126 ab0df1-ab0e09 1120->1126 1121->1120 1126->1106
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00AB0D92
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00AB0DB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\client.c$PDRF$Skipping, channel already loaded$com.freerdp.core.client$error: channel export function call failed$error: too many channels$freerdp_channels_client_load
                                        • API String ID: 3168844106-4217659166
                                        • Opcode ID: 54bbda36ee53c62ecbc131390e3c8906f74077a7628ea1042cc666a93b5b6c61
                                        • Instruction ID: eadeab83545dd98f09f69b29910d15792f5a53b68e1e0f2880e1f14788a71243
                                        • Opcode Fuzzy Hash: 54bbda36ee53c62ecbc131390e3c8906f74077a7628ea1042cc666a93b5b6c61
                                        • Instruction Fuzzy Hash: 96516271A40305ABDB20EF55ED86FAA77FCEF04714F104469F618EB2A2D774D9008BA4

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1127 bb3b76-bb3b91 freerdp_settings_set_bool 1128 bb3d20 1127->1128 1129 bb3b97-bb3b9e 1127->1129 1131 bb3d22-bb3d26 1128->1131 1129->1128 1130 bb3ba4-bb3ba8 1129->1130 1130->1128 1132 bb3bae-bb3bc1 freerdp_settings_set_string 1130->1132 1132->1128 1133 bb3bc7-bb3bcb 1132->1133 1134 bb3bcd-bb3bd0 1133->1134 1135 bb3bd2 1133->1135 1136 bb3bd5-bb3be5 freerdp_settings_set_string 1134->1136 1135->1136 1136->1128 1137 bb3beb-bb3bef 1136->1137 1138 bb3c0a-bb3c1c freerdp_settings_set_string 1137->1138 1139 bb3bf1-bb3c04 freerdp_settings_set_string 1137->1139 1138->1128 1140 bb3c22-bb3c35 freerdp_settings_set_string 1138->1140 1139->1128 1139->1138 1140->1128 1141 bb3c3b-bb3c4e freerdp_settings_set_string 1140->1141 1141->1128 1142 bb3c54-bb3c58 1141->1142 1143 bb3c5a-bb3c6a freerdp_settings_set_string 1142->1143 1144 bb3c70-bb3c8c freerdp_settings_set_uint32 1142->1144 1143->1128 1143->1144 1144->1128 1145 bb3c92-bb3ca4 freerdp_target_net_addresses_free 1144->1145 1146 bb3d1b-bb3d1e 1145->1146 1147 bb3ca6-bb3cd0 call b85feb * 2 1145->1147 1146->1131 1147->1128 1152 bb3cd2-bb3cd4 1147->1152 1152->1128 1153 bb3cd6-bb3cde 1152->1153 1153->1146 1154 bb3ce0-bb3d10 call b85ff6 1153->1154 1154->1128 1157 bb3d12-bb3d19 1154->1157 1157->1146 1157->1154
                                        APIs
                                        • freerdp_settings_set_bool.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000400,00000001), ref: 00BB3B87
                                        • freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000401,00000000), ref: 00BB3BB7
                                        • freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000404,?), ref: 00BB3BDB
                                        • freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000402,00000000), ref: 00BB3BFA
                                        • freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000014,?), ref: 00BB3C12
                                        • freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,000006C1,?), ref: 00BB3C2B
                                        • freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000403,?), ref: 00BB3C44
                                        • freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000015,00000000), ref: 00BB3C60
                                        • freerdp_settings_set_uint32.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000013,?), ref: 00BB3C82
                                        • freerdp_target_net_addresses_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00BB3C93
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_string$freerdp_settings_set_boolfreerdp_settings_set_uint32freerdp_target_net_addresses_free
                                        • String ID:
                                        • API String ID: 949014189-0
                                        • Opcode ID: 12f87a41451c66bc5c8156e90c5a793ed94ff3185f274a213cefdbc36b09d4f7
                                        • Instruction ID: 5c692f5e61c66c83839f3d16e468f8b5c8ea6794ead71d033e0781bfd017c312
                                        • Opcode Fuzzy Hash: 12f87a41451c66bc5c8156e90c5a793ed94ff3185f274a213cefdbc36b09d4f7
                                        • Instruction Fuzzy Hash: 9541C171A00A06BBE7215F34CD85FEA77E4FF04700F040478FA0596691EBB2EA60CB94
                                        APIs
                                          • Part of subcall function 00B35CD5: InitializeCriticalSectionAndSpinCount.KERNEL32(00000004,00000FA0,?,00000000,?,00B61701,00000001), ref: 00B35CF9
                                        • zgfx_context_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000), ref: 00B61874
                                          • Part of subcall function 00BB693A: zgfx_context_reset.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,00000000,00000000,?,00B61879,00000000), ref: 00BB6964
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpinzgfx_context_newzgfx_context_reset
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\channels\rdpgfx\client\rdpgfx_main.c$Failed to acquire reference to WLog %s$HashTable_New failed!$calloc failed!$com.freerdp.channels.rdpgfx.client$rdpgfx_client_context_new$zgfx_context_new failed!
                                        • API String ID: 3732774510-3243565116
                                        • Opcode ID: a056a1e0b7a9cb76cf7bc17e32a5e29950234d4d5d5eab87941494bf49f3f561
                                        • Instruction ID: b1b082a21fbd39d4324a65803a42c639275c78902d8614cf7824683bad267351
                                        • Opcode Fuzzy Hash: a056a1e0b7a9cb76cf7bc17e32a5e29950234d4d5d5eab87941494bf49f3f561
                                        • Instruction Fuzzy Hash: D471C5B1A84B026EE3249F2ADC42B6577E4FF15724F1444A9F504DB7D1EBB4E840CB94
                                        APIs
                                          • Part of subcall function 00B36B05: InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0,00000000,00000000,00000000,?,00AEE59B,00000001,00006060,00000010), ref: 00B36B3E
                                        • GetVersionExA.KERNEL32(?), ref: 00AEE5CD
                                        • GetNativeSystemInfo.KERNEL32(?), ref: 00AEE5E7
                                        • RegOpenKeyExA.ADVAPI32(80000002,Software\FreeRDP\FreeRDP\RemoteFX,00000000,00020119,?), ref: 00AEE612
                                        • primitives_get.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE ref: 00AEE6DC
                                        • CreateThreadpool.KERNEL32(00000000), ref: 00AEE6E2
                                        Strings
                                        • Software\FreeRDP\FreeRDP\RemoteFX, xrefs: 00AEE605
                                        • com.freerdp.codec.rfx, xrefs: 00AEE530
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: CountCreateCriticalInfoInitializeNativeOpenSectionSpinSystemThreadpoolVersionprimitives_get
                                        • String ID: Software\FreeRDP\FreeRDP\RemoteFX$com.freerdp.codec.rfx
                                        • API String ID: 3882483829-2530424157
                                        • Opcode ID: 74a3fc8103b25f0aab3d9236874a216c7d16663ef8fcbea9329d03f751a6b117
                                        • Instruction ID: 7326c8de1d2d05dbd8de2a0949e521c69aa95642d44bcb4d8f92dcda66d909bf
                                        • Opcode Fuzzy Hash: 74a3fc8103b25f0aab3d9236874a216c7d16663ef8fcbea9329d03f751a6b117
                                        • Instruction Fuzzy Hash: E7418DB1A00705AFE720EFA5DC86B9AB7E8FB44304F1084BDE6099B252EB70D954CB50
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_APPENDER,00000000,00000000), ref: 00B2E8B2
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_APPENDER,00000000,00000000), ref: 00B2E8D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: %s environment variable modified in my back$BINARY$CONSOLE$FILE$UDP$WLOG_APPENDER
                                        • API String ID: 1431749950-225596728
                                        • Opcode ID: b6abbf1cfb2883e568d644e8f0ab05d0e52dde2d884108c5ee3a0fe7f81d8b02
                                        • Instruction ID: a6542cf2f4e32c4be3e1e40360b53c734f29f61f10992d39fbbd95d58e54e013
                                        • Opcode Fuzzy Hash: b6abbf1cfb2883e568d644e8f0ab05d0e52dde2d884108c5ee3a0fe7f81d8b02
                                        • Instruction Fuzzy Hash: FA21DB3214836629E6587266FC8BE7B17D8CF52B7872000BBF429A90D1EF60D8819775
                                        APIs
                                        • freerdp_set_last_error_ex.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,rdp_set_error_info,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c,0000015B), ref: 00AB48D9
                                        • freerdp_set_last_error_ex.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000000,rdp_set_error_info,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c,0000016A), ref: 00AB498F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_set_last_error_ex
                                        • String ID: %s missing context=%p$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\rdp.c$ErrorInfo$com.freerdp.core.rdp$freerdp$rdp_set_error_info
                                        • API String ID: 270715978-29603548
                                        • Opcode ID: 0dc4678be5cd2369a5a88779f0ff922b6605b3944f77c23c99358bab424d0a81
                                        • Instruction ID: 52b07b6ea2a7c4b564ae1690aad0c072171ec13bf075aa051f52d29053a1aba4
                                        • Opcode Fuzzy Hash: 0dc4678be5cd2369a5a88779f0ff922b6605b3944f77c23c99358bab424d0a81
                                        • Instruction Fuzzy Hash: 6721DBB2A40700B6DB206B55DC82FEBBBBC9B55B10F544065F909AA2C3E7F09640CBB5
                                        APIs
                                        • audio_format_get_tag_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,?,?,00BB5425,?,?,?,?,00000000,?), ref: 00BB58FA
                                        • audio_format_get_tag_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000001,00000000,?,?,00BB5425,?,?,?,?,00000000,?), ref: 00BB5902
                                        • audio_format_compatible.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00BB5425,?,?,?,?,00BB5425,?,?,?,?,00000000,?), ref: 00BB594D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: audio_format_get_tag_string$audio_format_compatible
                                        • String ID: %s requires %s for sample input, got %s$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\dsp.c$Missing resample support, recompile -DWITH_SOXR=ON or -DWITH_DSP_FFMPEG=ON$com.freerdp.dsp$freerdp_dsp_resample
                                        • API String ID: 204136587-155179076
                                        • Opcode ID: 6358018219184910f07b59cb411ac18a64d767d430bbc2f571b98c0ed2e997c8
                                        • Instruction ID: 60e708fdc32b709a4620b166d767b9f1b1814dfffa3004f037d4738f9b092520
                                        • Opcode Fuzzy Hash: 6358018219184910f07b59cb411ac18a64d767d430bbc2f571b98c0ed2e997c8
                                        • Instruction Fuzzy Hash: 3A2195A16443016BE724AB75FC57FBA23E8DB10728F10046AF659EA2C1E9E1D881C279
                                        APIs
                                        • LoadLibraryA.KERNEL32(secur32.dll,?,00B34AEC), ref: 00B34B18
                                        • LoadLibraryA.KERNEL32(security.dll,?,00B34AEC), ref: 00B34B28
                                        • GetProcAddress.KERNEL32(00000000,InitSecurityInterfaceW), ref: 00B34B42
                                        • GetProcAddress.KERNEL32(InitSecurityInterfaceA), ref: 00B34B51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: InitSecurityInterfaceA$InitSecurityInterfaceW$secur32.dll$security.dll
                                        • API String ID: 2574300362-4081094439
                                        • Opcode ID: b349725013462b0364a5c29d88c18d94100fe706ccbbfc23bcfd3d25815afcee
                                        • Instruction ID: a0a4ecd90a4b413a542d8461f5884e3671667f3a5d9a493e39d63c6f908ab217
                                        • Opcode Fuzzy Hash: b349725013462b0364a5c29d88c18d94100fe706ccbbfc23bcfd3d25815afcee
                                        • Instruction Fuzzy Hash: 2DF05E72D58366578792BBB9BC10D177AF8ABC875431602B3E800D7250FBB0D8014FA4
                                        APIs
                                        • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00AE4320
                                        • GetFileSize.KERNEL32(00000000,?), ref: 00AE433A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: File$CreateSize
                                        • String ID: %s %hu %s %s %s
                                        • API String ID: 2791376181-2916857029
                                        • Opcode ID: 2b1a8cedadff337f3b525e9cdb5812b14a0f4ce9b60a9560408c9909be89dcef
                                        • Instruction ID: 94b503d5e9b7989f5dd1c60375f5949ee5829fceeb3546d0f510de252ca853f5
                                        • Opcode Fuzzy Hash: 2b1a8cedadff337f3b525e9cdb5812b14a0f4ce9b60a9560408c9909be89dcef
                                        • Instruction Fuzzy Hash: 05515FB1900655AFEB11ABB5EC45ABF7BFCEF09720F10416AF901E6190EB349E008B64
                                        APIs
                                        • ber_read_universal_tag.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000002,00000000), ref: 00AC502A
                                        • ber_read_length.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?), ref: 00AC503F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ber_read_lengthber_read_universal_tag
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\crypto\ber.c$ber_read_integer$com.freerdp.crypto$should implement reading an 8 bytes integer$should implement reading an integer with length=%d
                                        • API String ID: 3186670568-2454464461
                                        • Opcode ID: 1a22326ec256b9b0cea6b984fa01799f43e67c90d3b1264ca945eba7b588d83a
                                        • Instruction ID: 4f5542c6f3c5cd08a979bdc2a22707b2910377a440824b774ac0248998f4c503
                                        • Opcode Fuzzy Hash: 1a22326ec256b9b0cea6b984fa01799f43e67c90d3b1264ca945eba7b588d83a
                                        • Instruction Fuzzy Hash: E64153B1A04B509FDB20AF34DC82F2937E5AF52361F1A426DF599CA285E634E940CB64
                                        APIs
                                        • region16_rects.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?), ref: 00B09C6E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: region16_rects
                                        • String ID: (%hu,%hu-%hu,%hu)$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\region.c$band %d: $com.freerdp.codec$nrects=%u$region16_print
                                        • API String ID: 844131241-2640574824
                                        • Opcode ID: ddbec9a83417948e18c5f85b04ac83ace30113ec896de45865e5211e8e930742
                                        • Instruction ID: 3dc530c319867e634af7fa26fe24ec21901c81687caa7bd3d379ccdcee3be925
                                        • Opcode Fuzzy Hash: ddbec9a83417948e18c5f85b04ac83ace30113ec896de45865e5211e8e930742
                                        • Instruction Fuzzy Hash: CB31B472BC03517AF630AB65BC83F6636D8DB28B51F1041B6F91CEE2D1FAA1DD408260
                                        APIs
                                        • freerdp_set_last_error_ex.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00AA2C14
                                        • clearChannelError.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00AA2C1B
                                          • Part of subcall function 00AA26E1: ResetEvent.KERNEL32(?), ref: 00AA270A
                                          • Part of subcall function 00AB8142: ResetEvent.KERNEL32(?,?,00AA2C27,?,?,?,00000000,freerdp_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,000000AA), ref: 00AB814E
                                        Strings
                                        • freerdp_connect, xrefs: 00AA2C01
                                        • freerdp, xrefs: 00AA3062
                                        • ConnectionResult, xrefs: 00AA3077
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c, xrefs: 00AA2BFC
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: EventReset$ChannelErrorclearfreerdp_set_last_error_ex
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c$ConnectionResult$freerdp$freerdp_connect
                                        • API String ID: 3632380314-3564821047
                                        • Opcode ID: 4687f8ee81a887b039c1a1772aa66be3bf85fc47df8d76e6bed5c589ce53822d
                                        • Instruction ID: 8809c0f69363b630f3b034c370131e14e9a3b74e0aa319b42f634c06b465e4f3
                                        • Opcode Fuzzy Hash: 4687f8ee81a887b039c1a1772aa66be3bf85fc47df8d76e6bed5c589ce53822d
                                        • Instruction Fuzzy Hash: 2A319C71600206AFEB10DF79D885BAAB7E8FF09350F140179F808EB2A1EB719D54CB54
                                        APIs
                                        • ber_write_universal_tag.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000002,00000000), ref: 00AC5415
                                        • ber_write_length.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000001,?,00000002,00000000), ref: 00AC541D
                                        • ber_write_universal_tag.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000002,00000000), ref: 00AC5440
                                        • ber_write_length.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000002,?,00000002,00000000), ref: 00AC5448
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ber_write_lengthber_write_universal_tag
                                        • String ID:
                                        • API String ID: 1889070510-0
                                        • Opcode ID: 18ef3f9f5ae11241768caf1c4dc31a824dec3e3bd5586f49f269dacf6024e569
                                        • Instruction ID: 69e161583de6b746782a16165b8d8bd981fa4fe63ba23bab8c29ac42b94b6fe1
                                        • Opcode Fuzzy Hash: 18ef3f9f5ae11241768caf1c4dc31a824dec3e3bd5586f49f269dacf6024e569
                                        • Instruction Fuzzy Hash: C921F830901F44AFDB165B24CF42F6A77A6EF11B01F12845DF94A1F683C261BAC1CBA1
                                        APIs
                                        • glyph_cache_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00ACCB79
                                        • brush_cache_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00ACCB86
                                        • pointer_cache_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00ACCB94
                                        • bitmap_cache_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00ACCBA2
                                        • offscreen_cache_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00ACCBB0
                                        • palette_cache_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00ACCBBE
                                        • nine_grid_cache_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00ACCBCC
                                        • cache_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000), ref: 00ACCBDE
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: bitmap_cache_newbrush_cache_newcache_freeglyph_cache_newnine_grid_cache_newoffscreen_cache_newpalette_cache_newpointer_cache_new
                                        • String ID:
                                        • API String ID: 2332728789-0
                                        • Opcode ID: 42906154869710506a0c67ebba1e6bbb42983877cc0118c6e46d3c0bd67e0258
                                        • Instruction ID: 23ceca6193345f48b806bbe85177a0a61040955691436b53cac604c776959067
                                        • Opcode Fuzzy Hash: 42906154869710506a0c67ebba1e6bbb42983877cc0118c6e46d3c0bd67e0258
                                        • Instruction Fuzzy Hash: 25018436548B075AE325ABF6A943F3B67E88F42B70712443EE498DE981EF10DC0186B1
                                        APIs
                                        • region16_init.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AEF58A
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: region16_init
                                        • String ID:
                                        • API String ID: 4140821900-0
                                        • Opcode ID: 3e8d829aa97f6b1ed1f2f2cf94f42bc771981313d169c183af5fd76dbc63c424
                                        • Instruction ID: 7f961033459b0dd8560db98fa571d637013b5133a5a90240f09b59aa3e780598
                                        • Opcode Fuzzy Hash: 3e8d829aa97f6b1ed1f2f2cf94f42bc771981313d169c183af5fd76dbc63c424
                                        • Instruction Fuzzy Hash: 21515BB2D002599FDB18DFA5C8819EEBBF9FF48304F10452AF519E7281E7359A45CB60
                                        APIs
                                        • gdi_CreateCompatibleDC.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000000,?,?,?,00AEA9C7,00000000,?,?,?,?,?,?,?,?,00AEA899), ref: 00AEAAE7
                                        • gdi_CreateCompatibleBitmap.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,00000000,?,?,?,00AEA9C7,00000000,?,?,?,?), ref: 00AEAB0E
                                        • gdi_CreateBitmapEx.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,00000000,?,?,?,00AEA9C7,00000000,?,?,?,?), ref: 00AEAB2A
                                        • gdi_SelectObject.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?), ref: 00AEAB60
                                        • gdi_CreateRectRgn.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,00000000,00000000,00000000), ref: 00AEABA5
                                        • gdi_DeleteObject.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AEAC39
                                        • gdi_DeleteDC.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AEAC48
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: gdi_$Create$BitmapCompatibleDeleteObject$RectSelect
                                        • String ID:
                                        • API String ID: 412453062-0
                                        • Opcode ID: 63bcb7db3704573387d602035f9edcf4ce94fd8292c8b1d92a53da2faae9183a
                                        • Instruction ID: 96a18d788eab26ddf69344c682f192497fd4fb0633544c4182ed6eb52fbcfda9
                                        • Opcode Fuzzy Hash: 63bcb7db3704573387d602035f9edcf4ce94fd8292c8b1d92a53da2faae9183a
                                        • Instruction Fuzzy Hash: 3E51F375200B059FC725DF69D885EA6BBE1FF1C310B0549ADE98A8BB62E771E841CF40
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_PATH,00000000,00000000,00000000,?,?,?,?,?,00B36939,?,?,?,?,00B36A0A,?), ref: 00B3EABD
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_PATH,00000000,?,?,?,?,00B36939,?,?,?,?,00B36A0A,?,?,00000000), ref: 00B3EAE7
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_NAME,00000000,00000000,?,?,?,00B36939,?,?,?,?,00B36A0A,?,?,00000000), ref: 00B3EB14
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILEAPPENDER_OUTPUT_FILE_NAME,00000000,?,?,?,?,00B36939,?,?,?,?,00B36A0A,?,?,00000000), ref: 00B3EB37
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WLOG_FILEAPPENDER_OUTPUT_FILE_NAME$WLOG_FILEAPPENDER_OUTPUT_FILE_PATH
                                        • API String ID: 1431749950-2760771567
                                        • Opcode ID: 64b8cbb2c680fe32f6e99601145008881cc050ff3bd69e188d9b6544371e6878
                                        • Instruction ID: 7c9a803f3ad314b434b4107c2e4912e7f54218265d55e11f74f7df43fe25b236
                                        • Opcode Fuzzy Hash: 64b8cbb2c680fe32f6e99601145008881cc050ff3bd69e188d9b6544371e6878
                                        • Instruction Fuzzy Hash: 2D31E872901A15BBC7266BA59C89D5EBBE8FF40764B3000AAF511A36C0EF70ED10C7A0
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00D61278,00528C90,00528EC0,00000000), ref: 00528F0A
                                        • GetLastError.KERNEL32 ref: 00528F38
                                        • TlsGetValue.KERNEL32 ref: 00528F46
                                        • SetLastError.KERNEL32(00000000), ref: 00528F4F
                                        • RtlAcquireSRWLockExclusive.NTDLL(00D61284), ref: 00528F61
                                        • RtlReleaseSRWLockExclusive.NTDLL(00D61284), ref: 00528F73
                                        • TlsSetValue.KERNEL32(00000000,?,?,00000000,0050B080), ref: 00528FB5
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ErrorExclusiveLastLockOnceValue$AcquireExecuteInitRelease
                                        • String ID:
                                        • API String ID: 389898287-0
                                        • Opcode ID: 9cb5f48c1de3ce5b475772b25d2e55d01523d811ad452177640347e865af4d37
                                        • Instruction ID: aad61cf691aaa4d3a68be172d8cfb470702ae863d2a6aeac4ab4b5b4ba02963e
                                        • Opcode Fuzzy Hash: 9cb5f48c1de3ce5b475772b25d2e55d01523d811ad452177640347e865af4d37
                                        • Instruction Fuzzy Hash: 09218E35601215AFD740AFA4FD5ABBE7BA9BF4A701F090020F905D72A0DF719A04CBB5
                                        APIs
                                        • socket.WS2_32(00000002,00000002,00000011), ref: 00B3F673
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_UDP_TARGET,00000000,00000000,?,00B36921,?,?,?,?,00B36A0A,?,?,00000000,?,00B2E976,00000000), ref: 00B3F68A
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_UDP_TARGET,00000000,00000000,?,00B36921,?,?,?,?,00B36A0A,?,?,00000000,?,00B2E976,00000000), ref: 00B3F6AB
                                        • closesocket.WS2_32(?), ref: 00B3F6E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable$closesocketsocket
                                        • String ID: 127.0.0.1:20000$WLOG_UDP_TARGET
                                        • API String ID: 65193492-3368084233
                                        • Opcode ID: 22f9ddc175d671d303bc4544f3c5db3d8abbd22017b6a6e1905ac45bc6188453
                                        • Instruction ID: 4b148de00bb8ce53adaff73014f315d37d368bb8f84fdaf45e3b17a029148bb7
                                        • Opcode Fuzzy Hash: 22f9ddc175d671d303bc4544f3c5db3d8abbd22017b6a6e1905ac45bc6188453
                                        • Instruction Fuzzy Hash: CB219F32944B03ABD7346B659C5AA277BE4EB40724F3005BDF2429A6B1DFB1A405C750
                                        APIs
                                        • LoadLibraryA.KERNEL32(winsta.dll,?,00B378D9,00DE7120), ref: 00B40023
                                        • GetProcAddress.KERNEL32(00000000,WinStationVirtualOpen), ref: 00B4003C
                                        • GetProcAddress.KERNEL32(WinStationVirtualOpenEx), ref: 00B40052
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: WinStationVirtualOpen$WinStationVirtualOpenEx$winsta.dll
                                        • API String ID: 2238633743-2382846951
                                        • Opcode ID: d0da096a060a97cf49c1a7c486fdab3bef57caaeb0787c633869a7fa4daded98
                                        • Instruction ID: 066a523e558f0e3c8bcff637a2e56843d551e7ed15a6cabd901ed30c4a534960
                                        • Opcode Fuzzy Hash: d0da096a060a97cf49c1a7c486fdab3bef57caaeb0787c633869a7fa4daded98
                                        • Instruction Fuzzy Hash: A6010CB15253059FD700AFB0994DBA53AE4AB48354F0584F9EA49DB362DBB08114EF24
                                        APIs
                                        • glyph_cache_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00ACCB1E
                                        • brush_cache_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?), ref: 00ACCB26
                                        • pointer_cache_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?), ref: 00ACCB2E
                                        • bitmap_cache_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?), ref: 00ACCB36
                                        • offscreen_cache_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?), ref: 00ACCB3E
                                        • palette_cache_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?), ref: 00ACCB46
                                        • nine_grid_cache_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?), ref: 00ACCB4E
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: bitmap_cache_freebrush_cache_freeglyph_cache_freenine_grid_cache_freeoffscreen_cache_freepalette_cache_freepointer_cache_free
                                        • String ID:
                                        • API String ID: 637575458-0
                                        • Opcode ID: 7ad28be861358ee9bde9c91c788d2f392276a4a1cd27f1ec8984fa40b200d7dc
                                        • Instruction ID: 84cb668048a3da00974eb12ba1196e9785a36671cfe2edd5c1f5ec1231f609ba
                                        • Opcode Fuzzy Hash: 7ad28be861358ee9bde9c91c788d2f392276a4a1cd27f1ec8984fa40b200d7dc
                                        • Instruction Fuzzy Hash: EEE01231411A14ABCE323F61DE03E5EBBAAAF11761B01453CF59A61473CB23AC609BD1
                                        APIs
                                        • gdi_CRgnToRect.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00B0E040
                                        • gdi_RgnToRect.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?), ref: 00B0E04F
                                        • gdi_CRgnToRect.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00B0E062
                                        • gdi_RgnToRect.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?), ref: 00B0E0A3
                                        • gdi_CRgnToRect.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?,?,?,?), ref: 00B0E0C8
                                        • gdi_RectToCRgn.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B0E147
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Rectgdi_
                                        • String ID:
                                        • API String ID: 2404991910-0
                                        • Opcode ID: 694c56fce004a525680015dc1d261d4c1aa571adb3d61f6a2a820226a88c4657
                                        • Instruction ID: fbc46e1a54957323ccc6e5eefd7a28a78c51e687a1e293b96813fa69d02b4ff7
                                        • Opcode Fuzzy Hash: 694c56fce004a525680015dc1d261d4c1aa571adb3d61f6a2a820226a88c4657
                                        • Instruction Fuzzy Hash: 32519275E01219AFCF14CF98C9818EEBBF9FF48710B1444AAE515B7290D771EA51CBA0
                                        APIs
                                        • freerdp_settings_set_uint32.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,000007C0,?), ref: 00AE1DA2
                                        • freerdp_settings_set_bool.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,000007C8,00000001), ref: 00AE1DCC
                                        • freerdp_settings_set_bool.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,000007C8,00000000), ref: 00AE1DE8
                                        • freerdp_settings_set_bool.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,000007C9,00000000), ref: 00AE1DFC
                                        • freerdp_settings_set_bool.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,000007C8,00000000), ref: 00AE1E19
                                        • freerdp_settings_set_bool.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,000007C9,00000000), ref: 00AE1E2D
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_bool$freerdp_settings_set_uint32
                                        • String ID:
                                        • API String ID: 4272850885-0
                                        • Opcode ID: 3ea0a0162d7e9506aea58fcc0c8a3655e8c344f224c799a42870156a752d33d1
                                        • Instruction ID: a35bd35299e530f6cec458e034c19d69245c965410da774599b72bd5034ca103
                                        • Opcode Fuzzy Hash: 3ea0a0162d7e9506aea58fcc0c8a3655e8c344f224c799a42870156a752d33d1
                                        • Instruction Fuzzy Hash: A8112672F892B675F96022274CC3F7F179C0F62B50F190028FE08A50C1E9B0EA0088F6
                                        APIs
                                        • freerdp_image_copy.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?,?,08008000,00000000,00000000,00000000,?,00000001,?,?), ref: 00B08C2B
                                        Strings
                                        • 1bpp and 4bpp icons are not supported, xrefs: 00B08DB5
                                        • com.freerdp.color, xrefs: 00B08D98
                                        • freerdp_image_copy_from_icon_data, xrefs: 00B08DBA
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c, xrefs: 00B08DBF
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_image_copy
                                        • String ID: 1bpp and 4bpp icons are not supported$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c$com.freerdp.color$freerdp_image_copy_from_icon_data
                                        • API String ID: 1523062921-332027372
                                        • Opcode ID: e4d0d110bb4fd6cfaabaada03dae1de3b9af93ad289eb2df7dc5c35e1d3c8622
                                        • Instruction ID: fbb1d6774d870aa04d7f80de23c3dd9d9a29a4cee1382eb26ab6000ae962cda0
                                        • Opcode Fuzzy Hash: e4d0d110bb4fd6cfaabaada03dae1de3b9af93ad289eb2df7dc5c35e1d3c8622
                                        • Instruction Fuzzy Hash: D95197B2900219AADB149F15DC41BEA7BE9EB14340F0482FDF958A61D1DB70DF81CB64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: kbd-lang-list$kbd-list$monitor-list
                                        • API String ID: 0-1393584692
                                        • Opcode ID: 27b2f76fdbecc7ea1053a18b0d1d2c12bc4590c06070dc1dc5a10a8022998449
                                        • Instruction ID: 928d84e3b7300f16a03f38507132e47ce50b4bc7bb5412a2a563b3f7884d0e71
                                        • Opcode Fuzzy Hash: 27b2f76fdbecc7ea1053a18b0d1d2c12bc4590c06070dc1dc5a10a8022998449
                                        • Instruction Fuzzy Hash: 1031A731942228ABCB20AB68ED46DDAB7E8EB04714F0401E5F918A71D2DA70DE40CBE5
                                        Strings
                                        • interleaved_compress, xrefs: 00AF9AF5
                                        • com.freerdp.codec, xrefs: 00AF9AD0
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\interleaved.c, xrefs: 00AF9AFA
                                        • interleaved_compress: width (%u) or height (%u) is greater than 64, xrefs: 00AF9AF0
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\interleaved.c$com.freerdp.codec$interleaved_compress$interleaved_compress: width (%u) or height (%u) is greater than 64
                                        • API String ID: 0-4054760794
                                        • Opcode ID: a9233c2f744d2e5ff490221146589fc578881b54f70d8ea7a514bb9a2541f03f
                                        • Instruction ID: b6e7af8d732242c5d65d8aefe285b6fc3c81cd129e360d572cd73291c5e871f8
                                        • Opcode Fuzzy Hash: a9233c2f744d2e5ff490221146589fc578881b54f70d8ea7a514bb9a2541f03f
                                        • Instruction Fuzzy Hash: EA218772700209BFEF256F96EC46FBB3758EB14794F044129FA189A1A1E771EC90DB50
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33CC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$InitializeSecurityContextW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_InitializeSecurityContextW
                                        • API String ID: 689400697-743139187
                                        • Opcode ID: 618ef147a0b166494968e4e6bbd8231e61fed4d1c701afea7a245ae27540e486
                                        • Instruction ID: 3b6968f794bc458c8765a95fab6e11c830e7b91b172fd61e2c78f5bdeb062c72
                                        • Opcode Fuzzy Hash: 618ef147a0b166494968e4e6bbd8231e61fed4d1c701afea7a245ae27540e486
                                        • Instruction Fuzzy Hash: E921C932284244BBDF516F55EC42E9B3FF9EB54F54F1000A4FA04A91E1DA62DA60D764
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33DA3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$InitializeSecurityContextA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_InitializeSecurityContextA
                                        • API String ID: 689400697-1744466472
                                        • Opcode ID: d01eb3fdbf84777692d267f12bc131729086c32ec48da6c3629f2b06333dcf38
                                        • Instruction ID: faec0bb7f1d55820d2615d923e7cde23d653ca4b39dc09607b1cf5e0f960f43a
                                        • Opcode Fuzzy Hash: d01eb3fdbf84777692d267f12bc131729086c32ec48da6c3629f2b06333dcf38
                                        • Instruction Fuzzy Hash: E121C632244344BBDF127E56EC42EAB3FF9EB49B60F1000A4FA04A51F1D662DA61D774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33227
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcquireCredentialsHandleW: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcquireCredentialsHandleW
                                        • API String ID: 689400697-2657764935
                                        • Opcode ID: f3d487386311741d30161b611948301f39943991c95d77c9b6075299e55c30c8
                                        • Instruction ID: ffa2fdefbb391544f125a9cb2077315f18958eaae100cd77e90a7194fb93f071
                                        • Opcode Fuzzy Hash: f3d487386311741d30161b611948301f39943991c95d77c9b6075299e55c30c8
                                        • Instruction Fuzzy Hash: AE11B7322483447FDB116E96EC47EA73BF9EB94B64F1000E4FA04951E0D662CA20D774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B3384E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcceptSecurityContext: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcceptSecurityContext
                                        • API String ID: 689400697-2008077614
                                        • Opcode ID: 6f424fe7b6991943b5deaee2408ed21ae40191ca9b0ac740bbff89aa57759dec
                                        • Instruction ID: 377777eabab2ae3b439b8b76953ae6f92274add169459af744ac1788d6371810
                                        • Opcode Fuzzy Hash: 6f424fe7b6991943b5deaee2408ed21ae40191ca9b0ac740bbff89aa57759dec
                                        • Instruction Fuzzy Hash: 7511DA32244344BBDF116E56AC47EAB3FF9EB54B64F1000A5FA04A51E0DA61CE61D774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B332F9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: AcquireCredentialsHandleA: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_AcquireCredentialsHandleA
                                        • API String ID: 689400697-1172745827
                                        • Opcode ID: bf525fb3fa2cf589c1b76fa989aec67b00bbdf7052cc5cc42c138ebbd10e5eb0
                                        • Instruction ID: 116dea14e2a41d1aa2f583bc8b66e79303523c0eac5278c280fbff8b2c3efe50
                                        • Opcode Fuzzy Hash: bf525fb3fa2cf589c1b76fa989aec67b00bbdf7052cc5cc42c138ebbd10e5eb0
                                        • Instruction Fuzzy Hash: 3611DA322443457BDF117E56AC47E9B3FF9EB84B60F1040A4FA04A51E1DE62D960D778
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B34481
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$MakeSignature: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_MakeSignature
                                        • API String ID: 689400697-3834539683
                                        • Opcode ID: a1ef2262f043f6a5b9c3d9e5507717a8ea81f9e933ee0d629663e6b95f3cc874
                                        • Instruction ID: 263c64901f3acf6cd68ac66b9b11fdf31bec4ae78cf41cf6e9067eb90142c551
                                        • Opcode Fuzzy Hash: a1ef2262f043f6a5b9c3d9e5507717a8ea81f9e933ee0d629663e6b95f3cc874
                                        • Instruction Fuzzy Hash: C211E7313843447BEA217A56BC43F673BA8DB81B60F1040B5FA04EA6E1DEA1DE50D778
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B340BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$SetContextAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_SetContextAttributesW
                                        • API String ID: 689400697-247170817
                                        • Opcode ID: 05a9da384a3b98a94a49834f2130948d5992ac2b57c54a7c2a8c5a2439c3637a
                                        • Instruction ID: 92e0bfad7931267124c9cf6f9358f05b9b76f49513529f555acaa922720e3c32
                                        • Opcode Fuzzy Hash: 05a9da384a3b98a94a49834f2130948d5992ac2b57c54a7c2a8c5a2439c3637a
                                        • Instruction Fuzzy Hash: C711E7323847457BDA217A56FC43E673EACEB91B21F1040A4FA04EA1E1DAA1DE509774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B34544
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$VerifySignature: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_VerifySignature
                                        • API String ID: 689400697-1495805676
                                        • Opcode ID: dad343494b4da0c83fe8291fd76e0091d86fe1c31087b1afe8e4a684fd8882b2
                                        • Instruction ID: a6259dbec72b2e50793624333ee8fc3e12bdea5ffa9fb11cd8759a5a0ece2aac
                                        • Opcode Fuzzy Hash: dad343494b4da0c83fe8291fd76e0091d86fe1c31087b1afe8e4a684fd8882b2
                                        • Instruction Fuzzy Hash: F111E7713843407BDA517A56BC47F673BE8EB91B60F1000E4FA04AA2E1EBA1DA50C778
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B3417E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$SetContextAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_SetContextAttributesA
                                        • API String ID: 689400697-1164902870
                                        • Opcode ID: 412684852d719a644f8f3b1801c35647da2da1047373acc7c219e5c1ac3efa3a
                                        • Instruction ID: a8c1f7bf1defbf0723cfc3c74fe177794feb5dac65db76dfc98a04e441ba1eee
                                        • Opcode Fuzzy Hash: 412684852d719a644f8f3b1801c35647da2da1047373acc7c219e5c1ac3efa3a
                                        • Instruction Fuzzy Hash: EB11E7363847417BEA617A56BC43E673EBCEB91B60F1000E4FA04A91E1DA61DA90C774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33548
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImportSecurityContextW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImportSecurityContextW
                                        • API String ID: 689400697-3257054040
                                        • Opcode ID: 7363f5c45c45c1f80eefcfa48ea4772aa0df5e64794f592b6b011564f54cf34a
                                        • Instruction ID: 618a63a5deb37c763426a754e0f5e27c697eb39ef2a947e0a603459d3087be8c
                                        • Opcode Fuzzy Hash: 7363f5c45c45c1f80eefcfa48ea4772aa0df5e64794f592b6b011564f54cf34a
                                        • Instruction Fuzzy Hash: 4F11C4313883407BDA617A56AC47F673AE9EB90B64F1100A4FA049A1E0DE62DA549774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B3360B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImportSecurityContextA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImportSecurityContextA
                                        • API String ID: 689400697-848437295
                                        • Opcode ID: 81b43d290d178f185cd160a022ab5b65d27a7314d0315087f5cc108c010aa7c8
                                        • Instruction ID: 3e46fc52cffa4befa95885924d6d858878c9a305991fbe41959b44bf0fef648c
                                        • Opcode Fuzzy Hash: 81b43d290d178f185cd160a022ab5b65d27a7314d0315087f5cc108c010aa7c8
                                        • Instruction Fuzzy Hash: 4811E7313883407EDA117A56AC47E6B3BFCDB91F64F1000E4F904A92E1DE61CE5197B8
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B333CB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ExportSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ExportSecurityContext
                                        • API String ID: 689400697-3640258815
                                        • Opcode ID: 5194082a36693d0cb3dbddc1b44524771ec6d5a72efcc7e8074ff42344e88621
                                        • Instruction ID: 99e9b22d8226a1306ba68ae2f07449bebf15e210f36f49ad98f65b070bb31b57
                                        • Opcode Fuzzy Hash: 5194082a36693d0cb3dbddc1b44524771ec6d5a72efcc7e8074ff42344e88621
                                        • Instruction Fuzzy Hash: BF11E7313843447BDA217B56BC47F673AE8EB91F64F1000E4FA04AA2E0DA61CA508774
                                        APIs
                                        • ncrush_context_reset.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,00000000), ref: 00B01B36
                                        Strings
                                        • com.freerdp.codec, xrefs: 00B01AF1
                                        • ncrush_context_new: failed to initialize tables, xrefs: 00B01B0F
                                        • ncrush_context_new, xrefs: 00B01B14
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\ncrush.c, xrefs: 00B01B19
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ncrush_context_reset
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\ncrush.c$com.freerdp.codec$ncrush_context_new$ncrush_context_new: failed to initialize tables
                                        • API String ID: 2838332675-904927664
                                        • Opcode ID: 56098afaf1fd2c4003b0a8db9c761cd3fe2f6e63b16fd2632d4d6c4ae8bdadd2
                                        • Instruction ID: 982dac28d233bd04653d3c76acc2104c5097e4e161e525ded97b8885a18a79a9
                                        • Opcode Fuzzy Hash: 56098afaf1fd2c4003b0a8db9c761cd3fe2f6e63b16fd2632d4d6c4ae8bdadd2
                                        • Instruction Fuzzy Hash: 7C11C8726407023AE719BF69AC82FA677DCEB50754F10817DF51C9A2C1EBB1E95087B0
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B3378E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryCredentialsAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryCredentialsAttributesA
                                        • API String ID: 689400697-3754301720
                                        • Opcode ID: 44badc9752d8d7fd6aed27d2b0eef158f2d110d437d1cc1adedfb9bc308fb6bd
                                        • Instruction ID: cd10c1a3febec50a1ff80277f398746177ec60c52585c83fc3125dd5f7318b57
                                        • Opcode Fuzzy Hash: 44badc9752d8d7fd6aed27d2b0eef158f2d110d437d1cc1adedfb9bc308fb6bd
                                        • Instruction Fuzzy Hash: 1B11E7713843407AEA107756AC87E6B3AECE791F60F1000E4FA14992E0DE61DE51C774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B336CE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryCredentialsAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryCredentialsAttributesW
                                        • API String ID: 689400697-3413647607
                                        • Opcode ID: fb4e205cc0ad2aa229fc09cafc18bc3c8f224f97f54fcf082d39e47c569e2616
                                        • Instruction ID: 348da44b9c7e34815cfbd6c1a8f3f964bfd2b45713823e3ee8cfe48cafab224b
                                        • Opcode Fuzzy Hash: fb4e205cc0ad2aa229fc09cafc18bc3c8f224f97f54fcf082d39e47c569e2616
                                        • Instruction Fuzzy Hash: 3B11A7B13843407ADA117656AC87E6B3AECDB91F61F1000A4F904AA1E1DE61CE51C7B4
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33F3E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryContextAttributesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryContextAttributesA
                                        • API String ID: 689400697-3211427146
                                        • Opcode ID: 596807bb0b185fdc120d723b56743f3103d629a3aeff2945cacba2f7b28d59a6
                                        • Instruction ID: 7d51032fb93d99f9764af460c090a5b6a52ad1e6684801cf22e8ad5d0c583f4e
                                        • Opcode Fuzzy Hash: 596807bb0b185fdc120d723b56743f3103d629a3aeff2945cacba2f7b28d59a6
                                        • Instruction Fuzzy Hash: D611A7327883417BDA117B56AC43E673EFDDB95F60F1040E5F904D91D1DAA1CA108774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33E7E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QueryContextAttributesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QueryContextAttributesW
                                        • API String ID: 689400697-2578917824
                                        • Opcode ID: e92ce27db6719ad700bc80f8605395324320d7a9e300ae4f6d24f05f1ef3f4a4
                                        • Instruction ID: 558f2a2e98bc22e88db0325ddd79b5a97193115b3e35fc6e9f11ba7391c69544
                                        • Opcode Fuzzy Hash: e92ce27db6719ad700bc80f8605395324320d7a9e300ae4f6d24f05f1ef3f4a4
                                        • Instruction Fuzzy Hash: 1711C4323883507BDA616656AC43E673AFCE791F25F1000A5B504DA5E1D962CA1083B4
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B3316A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityPackageInfoA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityPackageInfoA
                                        • API String ID: 689400697-3351603741
                                        • Opcode ID: 996d90c7b88a7fda4adb155bae17b36e6be3af2a4efdbd9fd7dacb5a44f434a1
                                        • Instruction ID: 713d723c8e84ef8ba5bd912da4e0ebd4907b50765f02cde0bc61f6338eb90f8f
                                        • Opcode Fuzzy Hash: 996d90c7b88a7fda4adb155bae17b36e6be3af2a4efdbd9fd7dacb5a44f434a1
                                        • Instruction Fuzzy Hash: 7211C6313883447AEA613657AC47F673EECD791F60F2000E4FA04AA2D1EAA1DE11C774
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B330AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityPackageInfoW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityPackageInfoW
                                        • API String ID: 689400697-2261828479
                                        • Opcode ID: 0800f882eb85c7b87c18e0419566cfa5a83a4c85a634f573b3ffbd18d2112970
                                        • Instruction ID: 0a509eb2bc3b482ebd95bba22479eb9b5b22a9c8babf6c2979fc7d47d411746f
                                        • Opcode Fuzzy Hash: 0800f882eb85c7b87c18e0419566cfa5a83a4c85a634f573b3ffbd18d2112970
                                        • Instruction Fuzzy Hash: 3411C6313883407AEA607657BC47F673AFCD791F64F2001E4FA04AA2E1E991DE5183B4
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33FFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$QuerySecurityContextToken: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_QuerySecurityContextToken
                                        • API String ID: 689400697-2156878011
                                        • Opcode ID: 3a49bf896dad6cf4243e32d3284dfbd72c14b0844a9e6c2306e4c2783b1eda29
                                        • Instruction ID: 6086ebe4a7e1cec7cac4bc9419653d1f116662b247c6f89d888bbdc0798bb02f
                                        • Opcode Fuzzy Hash: 3a49bf896dad6cf4243e32d3284dfbd72c14b0844a9e6c2306e4c2783b1eda29
                                        • Instruction Fuzzy Hash: F411E9323883447BDA617656BC47F673AFCDBC1B64F1000E5F604DA1E1DA91DA5087B4
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B339DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$CompleteAuthToken: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_CompleteAuthToken
                                        • API String ID: 689400697-1972714555
                                        • Opcode ID: b767aee93e83481308785824eeab34ef34ee1826b12469895253f17d3a6c8bfc
                                        • Instruction ID: 5cdbd06d20f2d276d6c7fd554a44c38b1d5ce7b41e506987aba7a0769bc61833
                                        • Opcode Fuzzy Hash: b767aee93e83481308785824eeab34ef34ee1826b12469895253f17d3a6c8bfc
                                        • Instruction Fuzzy Hash: 601186313C43407BDA517657BC47F6B3AECDB91F64F1001E5B5049A2E1DA91DB5087B4
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33920
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: ApplyControlToken: %s (0x%08X)$C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$[%s]: Security module does not provide an implementation$sspi_ApplyControlToken
                                        • API String ID: 689400697-2845897268
                                        • Opcode ID: f5afcbe235093258155507b905f1c97aa238abb9c7701fb964b591015f8e0b20
                                        • Instruction ID: 37f9eca672fa75a6f1f5d1eadece4e7a86a3c30e634d0d9eae308d482d8853eb
                                        • Opcode Fuzzy Hash: f5afcbe235093258155507b905f1c97aa238abb9c7701fb964b591015f8e0b20
                                        • Instruction Fuzzy Hash: DE11C631388350BAEA513656BC47F673AECD791F64F1001E8B904AA1E1DAA1DE5087B4
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B32FF0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EnumerateSecurityPackagesA: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EnumerateSecurityPackagesA
                                        • API String ID: 689400697-1149382491
                                        • Opcode ID: 17092e16c50e1cc59dcfc39ef92065805f41fbf03a4f59c2e00c8db4e8b53d5c
                                        • Instruction ID: 038cee6546f8e67aa4cf0c0f0dd22d78920814ba823c7f42368839932dbbeb69
                                        • Opcode Fuzzy Hash: 17092e16c50e1cc59dcfc39ef92065805f41fbf03a4f59c2e00c8db4e8b53d5c
                                        • Instruction Fuzzy Hash: BD11A3313883407AEA243656EC47F6B3BECDB91F64F2000E4BA08AA1E1D951CE5083B4
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B32F33
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$EnumerateSecurityPackagesW: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_EnumerateSecurityPackagesW
                                        • API String ID: 689400697-255015424
                                        • Opcode ID: 05af5174258864db642472436ec0812f6c7001ee1f7a554441330332dc86c30e
                                        • Instruction ID: 9af154998be35d47bfc3d52c8ff39b24aec43570ab2b96954a2435e7476a9277
                                        • Opcode Fuzzy Hash: 05af5174258864db642472436ec0812f6c7001ee1f7a554441330332dc86c30e
                                        • Instruction Fuzzy Hash: BB11C6313883417EDA117756AC57F673AFCDB91B60F2001E5FA18AA1E1E951CD5087B4
                                        APIs
                                        • freerdp_image_copy.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00B095B5
                                        Strings
                                        • com.freerdp.color, xrefs: 00B095C8
                                        • freerdp_image_scale, xrefs: 00B095EB
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c, xrefs: 00B095F0
                                        • SmartScaling requested but compiled without libcairo support!, xrefs: 00B095E6
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_image_copy
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\color.c$SmartScaling requested but compiled without libcairo support!$com.freerdp.color$freerdp_image_scale
                                        • API String ID: 1523062921-212429655
                                        • Opcode ID: d10828cbb1b0358b25328d521f53a35574c23624f6e35f49a640a10bf0c1069f
                                        • Instruction ID: db499374d021cc2c23e6b233d84faba61752d7e78e57746de1b266558b4ec50e
                                        • Opcode Fuzzy Hash: d10828cbb1b0358b25328d521f53a35574c23624f6e35f49a640a10bf0c1069f
                                        • Instruction Fuzzy Hash: F321AF72240309BBDF15AF15DC42FAE3BA9EB68700F048159FD189A2A1E271DD51DB40
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B34241
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$RevertSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_RevertSecurityContext
                                        • API String ID: 689400697-954186549
                                        • Opcode ID: 6c552bfec04ebeaabfaa0befeb84469e5b7e041e6e157c1d38741a1ddb437cb4
                                        • Instruction ID: 582cac75f6813c3b23b64f5e568e93881627954f357dda10ee3835d40d2adfdf
                                        • Opcode Fuzzy Hash: 6c552bfec04ebeaabfaa0befeb84469e5b7e041e6e157c1d38741a1ddb437cb4
                                        • Instruction Fuzzy Hash: F311C2313883407BE6613656BC47F673AACD791B60F1000E5BA04FA2D1DEA1EE5486B8
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33C0E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$ImpersonateSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_ImpersonateSecurityContext
                                        • API String ID: 689400697-4242683877
                                        • Opcode ID: aefae24663cfda40b3f2829711572057a528aecb33eebd283f03e4c93a46afaf
                                        • Instruction ID: 04cfd6671878fd43a19cda60740b3c650009700b4c3f977addf8a475badcb7dd
                                        • Opcode Fuzzy Hash: aefae24663cfda40b3f2829711572057a528aecb33eebd283f03e4c93a46afaf
                                        • Instruction Fuzzy Hash: 8F11A5313843407BE6117656BC87F673AECDB91F60F5000E5B904EA2E1DD91DF5182B8
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33B54
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$FreeContextBuffer: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_FreeContextBuffer
                                        • API String ID: 689400697-1791514552
                                        • Opcode ID: 74238235e8b1e972ed9188cd02dd3a8885acd715b8c9874638c24b90b0d5d8b4
                                        • Instruction ID: 329fa9814d352f4ffc9c5edfe106f066b9819e3495dc4d027da15a1d4a3ac162
                                        • Opcode Fuzzy Hash: 74238235e8b1e972ed9188cd02dd3a8885acd715b8c9874638c24b90b0d5d8b4
                                        • Instruction Fuzzy Hash: 7811C2313883407BEA513656BC47E673AECD791F61F1000E4B904EA2D1ED91CA0087B8
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B3348E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$FreeCredentialsHandle: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_FreeCredentialsHandle
                                        • API String ID: 689400697-3116451197
                                        • Opcode ID: e46f3f6e9b6dc7051f2d09f118dd27e7c96a1d416be196453969cebfb3cf16ee
                                        • Instruction ID: 3c4abcb375fb8c13466e894f7526286b5035c348e4b28879ee8c8941632b2b90
                                        • Opcode Fuzzy Hash: e46f3f6e9b6dc7051f2d09f118dd27e7c96a1d416be196453969cebfb3cf16ee
                                        • Instruction Fuzzy Hash: B211E9313883507AD6217626BC47F273AECD791F60F1040F5B604DA2D1DE51DE408278
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00DE70C8,00B34AA1,00000000,00000000), ref: 00B33A9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Once$ExecuteInit
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\winpr\libwinpr\sspi\sspi.c$DeleteSecurityContext: %s (0x%08X)$[%s]: Security module does not provide an implementation$sspi_DeleteSecurityContext
                                        • API String ID: 689400697-4185332897
                                        • Opcode ID: dfd0738237e0568db64504b225974089394825d2e803ab5d21792c0010afc96c
                                        • Instruction ID: b80a76f19c14545b246ebd5de95562829e74784306eea39bfe4b9a956496910b
                                        • Opcode Fuzzy Hash: dfd0738237e0568db64504b225974089394825d2e803ab5d21792c0010afc96c
                                        • Instruction Fuzzy Hash: 7F11E5313883507AE6217657BC47F6B3AECD791F64F1000F4BA08EA2E1ED91DA0087B8
                                        APIs
                                        • primitives_get.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE ref: 00BB65CB
                                        Strings
                                        • yuv_process_work_callback, xrefs: 00BB662E
                                        • com.freerdp.codec, xrefs: 00BB660B
                                        • error when decoding lines, xrefs: 00BB6629
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\yuv.c, xrefs: 00BB6633
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: primitives_get
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\yuv.c$com.freerdp.codec$error when decoding lines$yuv_process_work_callback
                                        • API String ID: 2017034601-2620645302
                                        • Opcode ID: 93574c005c981cd89572a1b7a61dc9b0fc772b970b76a0cdb6d1b0c1202e246d
                                        • Instruction ID: f385004257d0101eb2c3e7989f857d7964fa1ab8632d8974ae40bb1a094a0538
                                        • Opcode Fuzzy Hash: 93574c005c981cd89572a1b7a61dc9b0fc772b970b76a0cdb6d1b0c1202e246d
                                        • Instruction Fuzzy Hash: 51019BB1600305AFD704DF54DC42FA9B7E8FF14714F0041A9F509DA381E6B1D941CBA4
                                        APIs
                                        • region16_extents.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00B09F06
                                        • region16_extents.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?), ref: 00B09F12
                                        • region16_n_rects.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?), ref: 00B09F1D
                                        • region16_n_rects.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00B09F7D
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: region16_extentsregion16_n_rects
                                        • String ID:
                                        • API String ID: 2062899502-0
                                        • Opcode ID: a777aa3e440b79e1151d2e5a78892d79e860e14bb9abc1479bfd8844a7d2d6d9
                                        • Instruction ID: e78ba1df6a77c8ccdc4c1ecbfabbfc9104ab5698a7ea62a2ec8bd044f091a983
                                        • Opcode Fuzzy Hash: a777aa3e440b79e1151d2e5a78892d79e860e14bb9abc1479bfd8844a7d2d6d9
                                        • Instruction Fuzzy Hash: 4F513C75D0022A9FCB14DF95C8409AEF7F5FF18350B11856AE859E7351E334AE40CBA0
                                        APIs
                                        • InitOnceExecuteOnce.KERNELBASE(00D61278,00528C90,00528EC0,00000000), ref: 00528E6A
                                        • GetLastError.KERNEL32 ref: 00528E7F
                                        • TlsGetValue.KERNEL32 ref: 00528E8D
                                        • SetLastError.KERNEL32(00000000), ref: 00528E96
                                        • TlsAlloc.KERNEL32 ref: 00528EC3
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ErrorLastOnce$AllocExecuteInitValue
                                        • String ID:
                                        • API String ID: 2822033501-0
                                        • Opcode ID: 0e62b3a3344236f63d5f1898dd49ef312d7997a755fc808404da7983d9a55fa1
                                        • Instruction ID: 9f76c2b8270d64c9502341bda12b78b1bf08725c7bc5a2799b5425b3ff75eb79
                                        • Opcode Fuzzy Hash: 0e62b3a3344236f63d5f1898dd49ef312d7997a755fc808404da7983d9a55fa1
                                        • Instruction Fuzzy Hash: 48015E396012189FCB009FB5BC59A7A7BB8FB8D710B550225F915E7390EB7099048B79
                                        APIs
                                        • audio_format_print.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?), ref: 00BB4A72
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: audio_format_print
                                        • String ID: AUDIO_FORMATS (%hu) ={$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c$audio_formats_print
                                        • API String ID: 2744001552-3527835062
                                        • Opcode ID: 4cabedaa49cc0eaf0296bcfaa14ec9e2d0ffebf81e4b404390a86ff16603b3fa
                                        • Instruction ID: 00900b19fbc5eeada7f82c4c8b926a4e28dd0fcd26c4f92bc56699f89aa9d3a8
                                        • Opcode Fuzzy Hash: 4cabedaa49cc0eaf0296bcfaa14ec9e2d0ffebf81e4b404390a86ff16603b3fa
                                        • Instruction Fuzzy Hash: 6311DA7228031537DA11AD269C43FFF27DCEF61B60F1400A9FD18611C2E7F5DA4182A5
                                        APIs
                                        • getChannelError.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AB1248
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ChannelError
                                        • String ID: ($ChannelDetached$freerdp
                                        • API String ID: 1163697128-436519898
                                        • Opcode ID: 0f391de8a35a3e0094b81aab7f0f191ea29aaec9515a8ccf944103e459668b8c
                                        • Instruction ID: f5d5bdeb2aed967a4dd91dd83ba5b44194fc71453b0381dfe6b1dc8f437d63e6
                                        • Opcode Fuzzy Hash: 0f391de8a35a3e0094b81aab7f0f191ea29aaec9515a8ccf944103e459668b8c
                                        • Instruction Fuzzy Hash: 98212E75A00209AFDF10DF98C985FEEBBF9BF08340F104469E944E7252D770AA509BA0
                                        APIs
                                        • getChannelError.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AB0BB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ChannelError
                                        • String ID: ($ChannelAttached$freerdp
                                        • API String ID: 1163697128-2646891115
                                        • Opcode ID: 98e8a7af8cb5ae07143566bddc4ca04fd89685f8f70a27c92d54dc5f43e2cb81
                                        • Instruction ID: 6702b6671483502552b85f5d089783802439302ec31be9c974ceca7639bc34e9
                                        • Opcode Fuzzy Hash: 98e8a7af8cb5ae07143566bddc4ca04fd89685f8f70a27c92d54dc5f43e2cb81
                                        • Instruction Fuzzy Hash: 0E210E71A00209EFDF14DF98C885FAEBBF9FF08354F1045A9E944E7252D771AA509BA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: audin$rdpsnd
                                        • API String ID: 0-930729200
                                        • Opcode ID: 3f2988012d45200fe4295e5271e0916a1af91f384a4df097edd1f3dec930dc33
                                        • Instruction ID: 84ca0c6c88fe82a708a2539a6c40e9d315bceb67ed64244b4dbdda0b9e966705
                                        • Opcode Fuzzy Hash: 3f2988012d45200fe4295e5271e0916a1af91f384a4df097edd1f3dec930dc33
                                        • Instruction Fuzzy Hash: E211BF31A49A26EBDB28CF25D8807AAF3E4FB05B51F14826EE46C57140DF306C90CBD9
                                        APIs
                                        • audio_format_get_tag_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,?,?,?,?), ref: 00BB4737
                                        Strings
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c, xrefs: 00BB4748
                                        • audio_format_print, xrefs: 00BB4743
                                        • %s: wFormatTag: 0x%04hX nChannels: %hu nSamplesPerSec: %u nAvgBytesPerSec: %u nBlockAlign: %hu wBitsPerSample: %hu cbSize: %hu, xrefs: 00BB473E
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: audio_format_get_tag_string
                                        • String ID: %s: wFormatTag: 0x%04hX nChannels: %hu nSamplesPerSec: %u nAvgBytesPerSec: %u nBlockAlign: %hu wBitsPerSample: %hu cbSize: %hu$C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\codec\audio.c$audio_format_print
                                        • API String ID: 2866491501-3564663344
                                        • Opcode ID: 49180dd968829b9cfb30aebb4df2640567f770170fdf9abb34ab973d9b77b90d
                                        • Instruction ID: 9595d3e334180f93b969ba220a8909be2368e11ffbed43103b8de20c12bd7a45
                                        • Opcode Fuzzy Hash: 49180dd968829b9cfb30aebb4df2640567f770170fdf9abb34ab973d9b77b90d
                                        • Instruction Fuzzy Hash: C0F03075140218BADB411F52DC02F7637ADEB48B14B24809AFD2C8C1A2E777D9A2E764
                                        APIs
                                        • freerdp_get_last_error.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AA2725
                                        • freerdp_set_last_error_ex.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,0002000B,freerdp_abort_connect,C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c,0000013A), ref: 00AA2745
                                        Strings
                                        • freerdp_abort_connect, xrefs: 00AA2739
                                        • C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c, xrefs: 00AA2734
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_get_last_errorfreerdp_set_last_error_ex
                                        • String ID: C:\Project\agent-windows\freerdp\FreeRDP\libfreerdp\core\freerdp.c$freerdp_abort_connect
                                        • API String ID: 3690923134-629580617
                                        • Opcode ID: 821a8865ca263572e45bda1e05c564eba31a3f2775d62542cd98768ca18c6de3
                                        • Instruction ID: 5cd72364b941056ac5e6366150eeb2afc733dda46354449938f204b2ee18fbc5
                                        • Opcode Fuzzy Hash: 821a8865ca263572e45bda1e05c564eba31a3f2775d62542cd98768ca18c6de3
                                        • Instruction Fuzzy Hash: E7E04835241215EBEA216F1DDD02F55B7989F02B91F140429F984770D1EB515A609785
                                        APIs
                                        • primitives_get.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE ref: 00BB633F
                                        • primitives_flags.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000), ref: 00BB6353
                                        • TpWaitForWork.NTDLL(00000000,00000000), ref: 00BB64A9
                                        • TpReleaseWork.NTDLL(00000000), ref: 00BB64B2
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Work$ReleaseWaitprimitives_flagsprimitives_get
                                        • String ID:
                                        • API String ID: 704174238-0
                                        • Opcode ID: 54a2e48152cce17e959ce97ae3ef72f2c350e091534c24599bc659ca8786ab69
                                        • Instruction ID: aec45a37a5a75ca2c798b646787bc68611847604112cd88979b6611a0311bafc
                                        • Opcode Fuzzy Hash: 54a2e48152cce17e959ce97ae3ef72f2c350e091534c24599bc659ca8786ab69
                                        • Instruction Fuzzy Hash: E76137B5A0060ADFCB14DF68C9819AEBBF5FF48310B1485AAE819E7350D774E991CF90
                                        APIs
                                        • gdi_SetRgn.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?,?,00000000,00000001,?,?), ref: 00B0C324
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: gdi_
                                        • String ID:
                                        • API String ID: 2273374161-0
                                        • Opcode ID: 2ead09a44aba127efa6001147bae376ec00e50ab3ae76740fbfd5d3136eef1b6
                                        • Instruction ID: 6b0cc2b1c4f0b306e3f7ea0549aa2dec115f0b2fee3fc17fefb1d100f5f24748
                                        • Opcode Fuzzy Hash: 2ead09a44aba127efa6001147bae376ec00e50ab3ae76740fbfd5d3136eef1b6
                                        • Instruction Fuzzy Hash: 4231C6B5900209EFCB10DF98C9859AEBBF9FF48310F1481AAE915E7251D335EA45CFA0
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00B35C16
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00B35C34
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00B35C54
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 00B35C9A
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$Enter
                                        • String ID:
                                        • API String ID: 2978645861-0
                                        • Opcode ID: 66ca1e30f420dee6fde62e8126f4835a48657db2a018eb8b2f0f4902d9841cfa
                                        • Instruction ID: 105edfb19c75193a07aa6205571cb367e609b195baca46175034b81a0eae4785
                                        • Opcode Fuzzy Hash: 66ca1e30f420dee6fde62e8126f4835a48657db2a018eb8b2f0f4902d9841cfa
                                        • Instruction Fuzzy Hash: 4E21AC35210B05EFDB308F14C981A69B7F8FB49329F6054A9F882AB250D770BE81CB50
                                        APIs
                                        • region16_rects.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000000), ref: 00B09BDC
                                        • region16_extents.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00B09BEC
                                        • rectangles_intersects.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,?), ref: 00B09BF7
                                          • Part of subcall function 00B097FD: rectangles_intersection.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,?,?), ref: 00B0980C
                                        • rectangles_intersects.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,?), ref: 00B09C1A
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: rectangles_intersects$rectangles_intersectionregion16_extentsregion16_rects
                                        • String ID:
                                        • API String ID: 3854534691-0
                                        • Opcode ID: 3ae0e6e2282d69f6a29daa640538588f82f3507cb970e478017c8bd43d05d967
                                        • Instruction ID: 45eefbe37a081f9bbfbd5842b852c8cb2d0cc14b9a8d5eb998d2b963d668456b
                                        • Opcode Fuzzy Hash: 3ae0e6e2282d69f6a29daa640538588f82f3507cb970e478017c8bd43d05d967
                                        • Instruction Fuzzy Hash: 6301963391821969FB34DB55D8C1ABB7BDCEB41765F14809AF858960C2EB35EC81C1A4
                                        APIs
                                        • freerdp_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE ref: 00B21F56
                                        • freerdp_context_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,00000000,?,?), ref: 00B21FA4
                                        • freerdp_register_addin_provider.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000000), ref: 00B21FC7
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_context_newfreerdp_newfreerdp_register_addin_provider
                                        • String ID:
                                        • API String ID: 3731710698-0
                                        • Opcode ID: ab12834b7386209dd9225a0c52b3c3bb7c10d4fe697bcb3e38077cf37fc0567b
                                        • Instruction ID: c4f2b97ec1364b1799923ee746d9fef4f1c1701d738d7853cf39ef13d3a7a4ff
                                        • Opcode Fuzzy Hash: ab12834b7386209dd9225a0c52b3c3bb7c10d4fe697bcb3e38077cf37fc0567b
                                        • Instruction Fuzzy Hash: 2A11E332604B126BC725AF6AE901B96B7E5FF65320F10095DF86C87291EB70E840C790
                                        APIs
                                        • freerdp_settings_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000), ref: 00AB7326
                                          • Part of subcall function 00AB7F9B: GetComputerNameExA.KERNEL32(00000000,?,?,00000000), ref: 00AB7FCC
                                          • Part of subcall function 00AB7F9B: freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?,00000680,?), ref: 00AB7FFC
                                        • freerdp_settings_set_string.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000,00000086,?), ref: 00AB6D8C
                                        Strings
                                        • C:\Windows\System32\mstscax.dll, xrefs: 00AB6F3F
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_set_string$ComputerNamefreerdp_settings_free
                                        • String ID: C:\Windows\System32\mstscax.dll
                                        • API String ID: 2334115954-183970058
                                        • Opcode ID: a79b86223a345c07abc0a6debb4095ccf30963f8a5f23448ecb45dd32ebd9363
                                        • Instruction ID: b548d8f55eb77287a8eb211cfe21c615301418d3008e06509f56887a182b8b3c
                                        • Opcode Fuzzy Hash: a79b86223a345c07abc0a6debb4095ccf30963f8a5f23448ecb45dd32ebd9363
                                        • Instruction Fuzzy Hash: DDE1B5B1505F009EE324DF38D885B97BBE4FF08311F50996EE5AE8B291D7B1A580CB48
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: Rectgdi_
                                        • String ID:
                                        • API String ID: 2404991910-3916222277
                                        • Opcode ID: 8ba7598446483d01aacccd95e18fab9370839817ab0e812389b110f6684f8608
                                        • Instruction ID: c05d36710c1e9e6fec4f2539581e7647ad9b99fc6f801a73d79e25742b71e96e
                                        • Opcode Fuzzy Hash: 8ba7598446483d01aacccd95e18fab9370839817ab0e812389b110f6684f8608
                                        • Instruction Fuzzy Hash: 1E51947300014ABBCF12DE94CD41DEB7BAEFF08344B064296FE19950A1E732E9659BA1
                                        APIs
                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0,?,?,?,00B36A0A,?,?,00000000,?,00B2E976,00000000), ref: 00B3697B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpin
                                        • String ID: %s: unknown handler type %u$WLog_Appender_New
                                        • API String ID: 2593887523-3466059274
                                        • Opcode ID: 7b4485a901dc53b69fd9c4677e7b7354340ba600e22f13c03d0c60acc6703c85
                                        • Instruction ID: ee1117747df04cd5ff6c4ecc689f9a1e173b4b1a01e40dea422b8e7d4b362854
                                        • Opcode Fuzzy Hash: 7b4485a901dc53b69fd9c4677e7b7354340ba600e22f13c03d0c60acc6703c85
                                        • Instruction Fuzzy Hash: B51140335482027685277A79AC8AF3F7BE8DB8EB30F34C3EAF405A6581DE34D8015151
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s-client.%s$DeviceServiceEntry
                                        • API String ID: 0-2733899524
                                        • Opcode ID: 49a8270cc65cca1563fb0639418680ba53bfcaff70cb7775a14e45181b137766
                                        • Instruction ID: ffc592f37a6eaeb08e064a9f8d725a7a2790ab9fe82526648d73bca45b97e3b2
                                        • Opcode Fuzzy Hash: 49a8270cc65cca1563fb0639418680ba53bfcaff70cb7775a14e45181b137766
                                        • Instruction Fuzzy Hash: 99119476A002196BDB109F99C881AAF7BBCDF99750F044129FD14D7281D7B4DE419B90
                                        APIs
                                        • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000003,00000080,00000000), ref: 00AE4060
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00AE4076
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: File$CreatePointer
                                        • String ID: %s %hu %s %s %s
                                        • API String ID: 2024441833-2916857029
                                        • Opcode ID: e877c607a2879f9df85d7758649ca1511e79618c2ea0dbb9df884c30cc64e638
                                        • Instruction ID: 85edfe990e18be4c9cccb732b85d390b6323b3bb4da8062c0e586992f0e6f193
                                        • Opcode Fuzzy Hash: e877c607a2879f9df85d7758649ca1511e79618c2ea0dbb9df884c30cc64e638
                                        • Instruction Fuzzy Hash: 8901A231101110BBDB212B66EC4AEA77F6DEF4A774F248164FA18990E2D722C952D6B0
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILTER,00000000,00000000,00000000,?,00B2E987), ref: 00B2EBF6
                                        • GetEnvironmentVariableA.KERNEL32(WLOG_FILTER,00000000,00000000,?,?,00B2E987), ref: 00B2EC1A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WLOG_FILTER
                                        • API String ID: 1431749950-2006202657
                                        • Opcode ID: 8ed5efb93f00419cfa7d15848c9beebf0d83502ad311124c874ecc79f0b0081f
                                        • Instruction ID: dfd34000b7d27e79c0f8530c79df330d474f44de2774a6f2fa74538a5cf9c9d4
                                        • Opcode Fuzzy Hash: 8ed5efb93f00419cfa7d15848c9beebf0d83502ad311124c874ecc79f0b0081f
                                        • Instruction Fuzzy Hash: 36F02B322183642B862437A6BC89C5B7FFDDE997E9320006AF01DC7210EF259C01C7B5
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WINPR_NATIVE_SSPI,00000000,00000000,?,?,00B34AE3), ref: 00B34BCC
                                        • GetEnvironmentVariableA.KERNEL32(WINPR_NATIVE_SSPI,00000000,00000000,?,?,00B34AE3), ref: 00B34BEC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: WINPR_NATIVE_SSPI
                                        • API String ID: 1431749950-1020623567
                                        • Opcode ID: 9109fa269ee941aa2fd87978f278b4375e8c6de6194315e099b5e27d0db50c09
                                        • Instruction ID: 8c335dd2a4bc4125d4c5cfc7e173b9912459ff4219ea53fce20aaa7a357c4d79
                                        • Opcode Fuzzy Hash: 9109fa269ee941aa2fd87978f278b4375e8c6de6194315e099b5e27d0db50c09
                                        • Instruction Fuzzy Hash: E6F0273265A13227D23531A86C56F6B6EE4CB87F25F711268F501D3182DF40A90392D5
                                        APIs
                                        • rfx_context_new.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AFA2ED
                                          • Part of subcall function 00AEE4DD: GetVersionExA.KERNEL32(?), ref: 00AEE5CD
                                          • Part of subcall function 00AEE4DD: GetNativeSystemInfo.KERNEL32(?), ref: 00AEE5E7
                                          • Part of subcall function 00AEE4DD: RegOpenKeyExA.ADVAPI32(80000002,Software\FreeRDP\FreeRDP\RemoteFX,00000000,00020119,?), ref: 00AEE612
                                        • progressive_context_free.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000), ref: 00AFA36D
                                        Strings
                                        • com.freerdp.codec.progressive, xrefs: 00AFA2CA
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: InfoNativeOpenSystemVersionprogressive_context_freerfx_context_new
                                        • String ID: com.freerdp.codec.progressive
                                        • API String ID: 2699998398-3622116780
                                        • Opcode ID: b698bfd4d43e9b4c5ea6b835fb99d134110c89cd45bf8fa36bcbfe9352ea6ac1
                                        • Instruction ID: 9e7ef16f5c1d7e0fc1aee2aecfc3d3a01f184e73e1150e671e348794c055158b
                                        • Opcode Fuzzy Hash: b698bfd4d43e9b4c5ea6b835fb99d134110c89cd45bf8fa36bcbfe9352ea6ac1
                                        • Instruction Fuzzy Hash: D3F0E976A05B161AE220BBB69801F9B7BD8DF52B70F24006EF20D9E5C1DB7094018265
                                        APIs
                                        • freerdp_settings_get_key_for_name.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(?), ref: 00AE1EEF
                                        • freerdp_settings_get_type_for_key.DNMYBOLOTEVDHJFJCACCHGWLCHVSNES-ELEVATE(00000000), ref: 00AE1F51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: freerdp_settings_get_key_for_namefreerdp_settings_get_type_for_key
                                        • String ID: TRUE
                                        • API String ID: 1888880752-3412697401
                                        • Opcode ID: d468c66acffba0a3a67a7e42c04e1bccc5c6b9ba9db05538ed9d99ac6acd7e1a
                                        • Instruction ID: 3198ab2096a3afc06c404e6d49c0607cffaa8355b50cddc013c806c36f51e911
                                        • Opcode Fuzzy Hash: d468c66acffba0a3a67a7e42c04e1bccc5c6b9ba9db05538ed9d99ac6acd7e1a
                                        • Instruction Fuzzy Hash: D9E0E5333002A46ADA216B9BDC86D9F325CEB85B61F054066F90597241AB70D90046F0
                                        APIs
                                        • GetEnvironmentVariableA.KERNEL32(WTSAPI_LIBRARY,00000000,00000000,?,00B37163), ref: 00B37190
                                        • GetEnvironmentVariableA.KERNEL32(WTSAPI_LIBRARY,00000000,00000000,?,?,00B37163), ref: 00B371B1
                                          • Part of subcall function 00B37310: LoadLibraryA.KERNEL32(?,?,00B371C4,00000000,?,?,00B37163), ref: 00B37316
                                          • Part of subcall function 00B37310: GetProcAddress.KERNEL32(00000000,InitWtsApi), ref: 00B3732B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable$AddressLibraryLoadProc
                                        • String ID: WTSAPI_LIBRARY
                                        • API String ID: 3590464466-1122459656
                                        • Opcode ID: c9a0b64e5bfb22882917585f12cb05fc55529fa1f901e5d376b11a32ed29e90d
                                        • Instruction ID: 50cbb3a1588a62c7c84a27f1558fb361b28c7748cdb103f93ce12bd03aa70549
                                        • Opcode Fuzzy Hash: c9a0b64e5bfb22882917585f12cb05fc55529fa1f901e5d376b11a32ed29e90d
                                        • Instruction Fuzzy Hash: 79E09B33189A132AD2353295BC1EFAF3AA4DFC1B65F340599F500B71C49F605902C2A6
                                        APIs
                                        • LoadLibraryA.KERNEL32(?,?,00B371C4,00000000,?,?,00B37163), ref: 00B37316
                                        • GetProcAddress.KERNEL32(00000000,InitWtsApi), ref: 00B3732B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: InitWtsApi
                                        • API String ID: 2574300362-3428673357
                                        • Opcode ID: 65bc5af3332579470f32234bb81d8480ff232bae7e8ad3f8e4b526effaaabdd2
                                        • Instruction ID: e0d3a9a68323d2ca77fe9d6a6a10df02731a28055e46a81b305df394cd28696b
                                        • Opcode Fuzzy Hash: 65bc5af3332579470f32234bb81d8480ff232bae7e8ad3f8e4b526effaaabdd2
                                        • Instruction Fuzzy Hash: F5D02E706883459BCF00BFF2FC058223FECEBC06403041871AC0CC6220EF30C60196A8
                                        APIs
                                        • GetLastError.KERNEL32(?,?,00B8B650,00CE0388,0000000C), ref: 00B9F430
                                        • SetLastError.KERNEL32(00000000), ref: 00B9F4D2
                                        • GetLastError.KERNEL32(00000000,?,00B85FDD,00B9F0E3,?,?,00B2F77A,0000000C,?,?,?,?,00AA27D2,?,?,?), ref: 00B9F581
                                        • SetLastError.KERNEL32(00000000,00000006), ref: 00B9F623
                                          • Part of subcall function 00B9F066: HeapFree.KERNEL32(00000000,00000000,?,00B85F2D,?,?,?,00B2FA9A,?,?,?,?,?,00AA293F,?,?), ref: 00B9F07C
                                          • Part of subcall function 00B9F066: GetLastError.KERNEL32(?,?,00B85F2D,?,?,?,00B2FA9A,?,?,?,?,?,00AA293F,?,?), ref: 00B9F087
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.610213056198.00000000004C1000.00000040.00000001.01000000.00000007.sdmp, Offset: 004C0000, based on PE: true
                                        • Associated: 0000000A.00000002.610212995260.00000000004C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C44000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000C4C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CEB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000CFE000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D0F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000D5C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000DF8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000000FE1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.00000000019E3000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001B4A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610213056198.0000000001BED000.00000040.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 0000000A.00000002.610216048287.0000000001C13000.00000004.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_4c0000_dnmybolotevdhjfjcacchgwlchvsnes-elevate.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FreeHeap
                                        • String ID:
                                        • API String ID: 3197834085-0
                                        • Opcode ID: b9c9eeb3e4ea4561cf2dd36f1f1d4347a7bdb255814bdbde8fbe6c512ae99460
                                        • Instruction ID: c77af85462b6969ec2ab389005150322af694c03e39128f60c337d123c8d21e0
                                        • Opcode Fuzzy Hash: b9c9eeb3e4ea4561cf2dd36f1f1d4347a7bdb255814bdbde8fbe6c512ae99460
                                        • Instruction Fuzzy Hash: E04190356092126EEE253BBCEC86F3E26C89F16774F2507F2F624E62A1DF548D058261