Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TiNgny4xSB.dll

Overview

General Information

Sample name:TiNgny4xSB.dll
renamed because original name is a hash value
Original sample name:1552c43ecf6eeb5e2fe13cc1c25e6bdacf227222afaa9a523d996b6331945505.exe
Analysis ID:1576561
MD5:e5ec8b7cf88c66f78d607f76a2095fda
SHA1:fda7752c604ff7673ae31dc45a8f0a9dd0a3a6ac
SHA256:1552c43ecf6eeb5e2fe13cc1c25e6bdacf227222afaa9a523d996b6331945505
Tags:94-232-40-41exeuser-JAMESWT_MHT
Infos:

Detection

BruteRatel
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected BruteRatel
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3128 cmdline: loaddll64.exe "C:\Users\user\Desktop\TiNgny4xSB.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 3224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6112 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 2576 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2836 cmdline: rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktop MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7148 cmdline: C:\Windows\system32\WerFault.exe -u -p 2836 -s 464 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 6408 cmdline: rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopInfos MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 5512 cmdline: C:\Windows\system32\WerFault.exe -u -p 6408 -s 488 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 4768 cmdline: rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktops MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 2820 cmdline: C:\Windows\system32\WerFault.exe -u -p 4768 -s 488 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 3148 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMAddNewDesktop MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4500 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopInfos MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5820 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktops MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1988 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nviewExecute MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2448 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUnload MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4400 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUninstallNotify MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5240 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewLoadHook MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6496 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewCmd MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1276 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMSetSettingHWND MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2020 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMParseSetting MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5632 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMUpdate MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6204 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSetStartupProfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6592 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSave MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7176 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLock MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7184 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadEx MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7192 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadApp MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7200 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoad MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7208 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMImport MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7216 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetStartupProfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7224 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoEx MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7236 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfo MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7244 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileDirectory MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7252 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetCurrentProfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7264 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMFindProfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7276 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMEnum MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7292 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMDelete MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Brute Ratel C4, BruteRatelBrute Ratel C4 (BRC4) is a commercial framework for red-teaming and adversarial attack simulation, which made its first appearance in December 2020. It was specifically designed to evade detection by endpoint detection and response (EDR) and antivirus (AV) capabilities. BRC4 allows operators to deploy a backdoor agent known as Badger (aka BOLDBADGER) within a target environment.This agent enables arbitrary command execution, facilitating lateral movement, privilege escalation, and the establishment of additional persistence avenues. The Badger backdoor agent can communicate with a remote server via DNS over HTTPS, HTTP, HTTPS, SMB, and TCP, using custom encrypted channels. It supports a variety of backdoor commands including shell command execution, file transfers, file execution, and credential harvesting. Additionally, the Badger agent can perform tasks such as port scanning, screenshot capturing, and keystroke logging. Notably, in September 2022, a cracked version of Brute Ratel C4 was leaked in the cybercriminal underground, leading to its use by threat actors.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.brute_ratel_c4
No configs have been found
SourceRuleDescriptionAuthorStrings
00000017.00000002.3985806152.000001CE5002C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
    00000017.00000002.3985806152.000001CE500D4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
      00000017.00000002.4024711141.000001CE50158000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
        Process Memory Space: rundll32.exe PID: 6496JoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.7% probability
          Source: TiNgny4xSB.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: iew\v200\_out\x64-Release\nView64.pdb source: loaddll64.exe, 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2805679611.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.2807177411.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2806913781.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2264712764.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2243840484.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2236198947.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2250291096.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2258720451.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2257070968.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.4048457659.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2260513992.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2261541384.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2264374518.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2261619564.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2247132181.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2258515346.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2260396831.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2261727610.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2263668707.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2263673097.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2248812923.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.2262399294.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.2259282916.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000026.00000002.2256871278.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2238385048.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.2256211385.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, TiNgny4xSB.dll
          Source: Binary string: D:\workspace\workspace\nViewBranchBcDQ%ag&CC(NuA9u@W@o$iew\v200\_out\x64-Release\nView64.pdbU source: loaddll64.exe, 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2805679611.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.2807177411.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2806913781.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2264712764.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2243840484.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2236198947.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2250291096.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2258720451.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2257070968.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.4048457659.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2260513992.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2261541384.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2264374518.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2261619564.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2247132181.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2258515346.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2260396831.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2261727610.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2263668707.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2263673097.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2248812923.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.2262399294.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.2259282916.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000026.00000002.2256871278.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2238385048.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.2256211385.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, TiNgny4xSB.dll
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CC0B20 FindFirstFileW,lstrcmpW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF8A8CC0B20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CC0EC0 FindFirstFileW,FindClose,0_2_00007FF8A8CC0EC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB44E5 GetCommandLineW,CommandLineToArgvW,lstrcmpW,lstrcmpW,GetCurrentProcess,IsWow64Process,MessageBoxW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindFirstFileW,FindClose,GetTempFileNameW,CopyFileW,lstrcmpW,lstrcmpW,FindWindowW,SendMessageW,IsWindow,PostMessageW,SHDeleteKeyW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,LocalFree,0_2_00007FF8A8CB44E5
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBBD20 RegOpenKeyExW,RegQueryValueExW,RegCloseKey,MessageBoxW,ShellExecuteW,GetSystemDirectoryW,wsprintfW,FindFirstFileW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF8A8CBBD20
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TiN_4bec5a90a1db412c7f3be65d6f4f1f3894fd97_8f532422_74e808d9-5170-4b2e-8593-f3e5947d537b\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TiN_04504176a318ef6a4711c8eb84999e6f6eb1_8f532422_9062deff-fe07-4994-bd6a-5e42f06b1cb1\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior

          Networking

          barindex
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.46.11 8817
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.40.41 8817
          Source: global trafficTCP traffic: 192.168.2.5:49713 -> 94.232.40.41:8817
          Source: global trafficTCP traffic: 192.168.2.5:49870 -> 94.232.46.11:8817
          Source: Joe Sandbox ViewASN Name: WELLWEBNL WELLWEBNL
          Source: Joe Sandbox ViewASN Name: WELLWEBNL WELLWEBNL
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: cronoze.com
          Source: global trafficDNS traffic detected: DNS query: muuxxu.com
          Source: rundll32.exe, 00000017.00000003.3675200688.000001CE5030A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3985806152.000001CE5010D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2454930078.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973864275.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.4025680363.000001CE5030A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
          Source: rundll32.exe, 00000017.00000003.3675200688.000001CE5030A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3985806152.000001CE5010D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2454930078.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973864275.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.4025680363.000001CE5030A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
          Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
          Source: rundll32.exe, 00000017.00000003.3675200688.000001CE5030A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2454930078.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973864275.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.4025680363.000001CE5030A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
          Source: rundll32.exe, 00000017.00000003.3675200688.000001CE5030A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2454930078.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973864275.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.4025680363.000001CE5030A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
          Source: rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com/
          Source: rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com:8817/pentium.php
          Source: rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com:8817/pentium.php%P
          Source: rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com:8817/pentium.phpZ
          Source: rundll32.exe, 00000017.00000003.3675415250.000001CE4C3C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973830358.000001CE4C3C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com/
          Source: rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/
          Source: rundll32.exe, 00000017.00000003.3675415250.000001CE4C3C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973830358.000001CE4C3C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.php
          Source: rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.php.P
          Source: rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.php2P
          Source: rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.phpDQd
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB6A10 GetSystemMetrics,GetAsyncKeyState,0_2_00007FF8A8CB6A10
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBD460 CreateMutexW,GetLastError,WaitForSingleObject,CreateProcessAsUserW,CloseHandle,CloseHandle,ReleaseMutex,CloseHandle,_invalid_parameter_noinfo_noreturn,RegSetValueExW,RegCloseKey,SendMessageW,RegQueryValueExW,RegCloseKey,0_2_00007FF8A8CBD460
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF7CA40_2_00007FF8A8CF7CA4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF69F40_2_00007FF8A8CF69F4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF69940_2_00007FF8A8CF6994
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D84AD00_2_00007FF8A8D84AD0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CA0A400_2_00007FF8A8CA0A40
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D0EB980_2_00007FF8A8D0EB98
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CE2BA00_2_00007FF8A8CE2BA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF6B400_2_00007FF8A8CF6B40
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D7ECE00_2_00007FF8A8D7ECE0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D20C000_2_00007FF8A8D20C00
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CA4D300_2_00007FF8A8CA4D30
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB4ED00_2_00007FF8A8CB4ED0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CAEE500_2_00007FF8A8CAEE50
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB2E600_2_00007FF8A8CB2E60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D881E00_2_00007FF8A8D881E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB21B00_2_00007FF8A8CB21B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8C9E1100_2_00007FF8A8C9E110
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D5A3B00_2_00007FF8A8D5A3B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D743800_2_00007FF8A8D74380
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB44E50_2_00007FF8A8CB44E5
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D104980_2_00007FF8A8D10498
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB04900_2_00007FF8A8CB0490
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CC64600_2_00007FF8A8CC6460
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D7E4300_2_00007FF8A8D7E430
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CA85100_2_00007FF8A8CA8510
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D405000_2_00007FF8A8D40500
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CCE67C0_2_00007FF8A8CCE67C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF679C0_2_00007FF8A8CF679C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBE7500_2_00007FF8A8CBE750
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CC68000_2_00007FF8A8CC6800
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D959E00_2_00007FF8A8D959E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CAF9200_2_00007FF8A8CAF920
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CA3AC00_2_00007FF8A8CA3AC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF1AE40_2_00007FF8A8CF1AE4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D11D980_2_00007FF8A8D11D98
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBBD200_2_00007FF8A8CBBD20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF5EC00_2_00007FF8A8CF5EC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB3F900_2_00007FF8A8CB3F90
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB1F500_2_00007FF8A8CB1F50
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D7D1E00_2_00007FF8A8D7D1E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB71500_2_00007FF8A8CB7150
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CC11500_2_00007FF8A8CC1150
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF72480_2_00007FF8A8CF7248
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBD4600_2_00007FF8A8CBD460
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBF5E00_2_00007FF8A8CBF5E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBB5B00_2_00007FF8A8CBB5B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF75600_2_00007FF8A8CF7560
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF97900_2_00007FF8A8CF9790
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBF7B00_2_00007FF8A8CBF7B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CF77200_2_00007FF8A8CF7720
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB38F00_2_00007FF8A8CB38F0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CE38880_2_00007FF8A8CE3888
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D7B8800_2_00007FF8A8D7B880
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004437C0_2_000000018004437C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800377880_2_0000000180037788
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002600C0_2_000000018002600C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002A01C0_2_000000018002A01C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800462C40_2_00000001800462C4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000A3140_2_000000018000A314
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800423EC0_2_00000001800423EC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A47C0_2_000000018001A47C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800125500_2_0000000180012550
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003A5540_2_000000018003A554
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003E7040_2_000000018003E704
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800167440_2_0000000180016744
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800147EC0_2_00000001800147EC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800268900_2_0000000180026890
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003A9040_2_000000018003A904
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800329B40_2_00000001800329B4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180042A100_2_0000000180042A10
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180008D6C0_2_0000000180008D6C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180032E140_2_0000000180032E14
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180048E5A0_2_0000000180048E5A
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180036E700_2_0000000180036E70
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180024F600_2_0000000180024F60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000AF740_2_000000018000AF74
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800190200_2_0000000180019020
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800130780_2_0000000180013078
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003D08C0_2_000000018003D08C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800330A80_2_00000001800330A8
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B1380_2_000000018001B138
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003713C0_2_000000018003713C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800332780_2_0000000180033278
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F28C0_2_000000018001F28C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003B2940_2_000000018003B294
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800193F00_2_00000001800193F0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003B5080_2_000000018003B508
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004363C0_2_000000018004363C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800176E40_2_00000001800176E4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800097A80_2_00000001800097A8
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800197C00_2_00000001800197C0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800478340_2_0000000180047834
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800158A00_2_00000001800158A0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003D91C0_2_000000018003D91C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B9240_2_000000018001B924
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800279B80_2_00000001800279B8
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180045A600_2_0000000180045A60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001FA9C0_2_000000018001FA9C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180013BA00_2_0000000180013BA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180029D900_2_0000000180029D90
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180015EA00_2_0000000180015EA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002FF500_2_000000018002FF50
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AEAD640_2_000001BE22AEAD64
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AC9D400_2_000001BE22AC9D40
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AD4B740_2_000001BE22AD4B74
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AF407C0_2_000001BE22AF407C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AFE0600_2_000001BE22AFE060
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AD404C0_2_000001BE22AD404C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AD6E740_2_000001BE22AD6E74
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AF7E440_2_000001BE22AF7E44
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AE6FE00_2_000001BE22AE6FE0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AEAFF00_2_000001BE22AEAFF0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22ACBF480_2_000001BE22ACBF48
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AFC4DC0_2_000001BE22AFC4DC
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018004437C3_2_000000018004437C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800377883_2_0000000180037788
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800147EC3_2_00000001800147EC
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002600C3_2_000000018002600C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002A01C3_2_000000018002A01C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800190203_2_0000000180019020
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800478343_2_0000000180047834
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800130783_2_0000000180013078
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003D08C3_2_000000018003D08C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800268903_2_0000000180026890
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800158A03_2_00000001800158A0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800330A83_2_00000001800330A8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003A9043_2_000000018003A904
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003D91C3_2_000000018003D91C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B9243_2_000000018001B924
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B1383_2_000000018001B138
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003713C3_2_000000018003713C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800329B43_2_00000001800329B4
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800279B83_2_00000001800279B8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180042A103_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180045A603_2_0000000180045A60
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800332783_2_0000000180033278
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001F28C3_2_000000018001F28C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003B2943_2_000000018003B294
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001FA9C3_2_000000018001FA9C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800462C43_2_00000001800462C4
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000A3143_2_000000018000A314
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180013BA03_2_0000000180013BA0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800193F03_2_00000001800193F0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800423EC3_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001A47C3_2_000000018001A47C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003B5083_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800125503_2_0000000180012550
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003A5543_2_000000018003A554
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180008D6C3_2_0000000180008D6C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180029D903_2_0000000180029D90
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180032E143_2_0000000180032E14
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018004363C3_2_000000018004363C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180048E5A3_2_0000000180048E5A
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180036E703_2_0000000180036E70
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180015EA03_2_0000000180015EA0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800176E43_2_00000001800176E4
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003E7043_2_000000018003E704
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800167443_2_0000000180016744
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002FF503_2_000000018002FF50
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180024F603_2_0000000180024F60
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000AF743_2_000000018000AF74
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800097A83_2_00000001800097A8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800197C03_2_00000001800197C0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA655A77C3_2_0000020CA655A77C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA655BF483_2_0000020CA655BF48
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA6576FE03_2_0000020CA6576FE0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA657AFF03_2_0000020CA657AFF0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA656A7943_2_0000020CA656A794
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA65657C03_2_0000020CA65657C0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA658E0603_2_0000020CA658E060
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA656404C3_2_0000020CA656404C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA658407C3_2_0000020CA658407C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA65668743_2_0000020CA6566874
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA658C4DC3_2_0000020CA658C4DC
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA657AD643_2_0000020CA657AD64
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA65635243_2_0000020CA6563524
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA6559D403_2_0000020CA6559D40
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA6566E743_2_0000020CA6566E74
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA6587E443_2_0000020CA6587E44
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA655B2E83_2_0000020CA655B2E8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA6564B743_2_0000020CA6564B74
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA656B4503_2_0000020CA656B450
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA65939E43_2_0000020CA65939E4
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA658C2683_2_0000020CA658C268
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018004437C4_2_000000018004437C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800377884_2_0000000180037788
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800147EC4_2_00000001800147EC
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002600C4_2_000000018002600C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A01C4_2_000000018002A01C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800190204_2_0000000180019020
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800478344_2_0000000180047834
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800130784_2_0000000180013078
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003D08C4_2_000000018003D08C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800268904_2_0000000180026890
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800158A04_2_00000001800158A0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800330A84_2_00000001800330A8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A9044_2_000000018003A904
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003D91C4_2_000000018003D91C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B9244_2_000000018001B924
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B1384_2_000000018001B138
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003713C4_2_000000018003713C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800329B44_2_00000001800329B4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800279B84_2_00000001800279B8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180042A104_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180045A604_2_0000000180045A60
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800332784_2_0000000180033278
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F28C4_2_000000018001F28C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003B2944_2_000000018003B294
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FA9C4_2_000000018001FA9C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800462C44_2_00000001800462C4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A3144_2_000000018000A314
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013BA04_2_0000000180013BA0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800193F04_2_00000001800193F0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800423EC4_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A47C4_2_000000018001A47C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003B5084_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800125504_2_0000000180012550
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A5544_2_000000018003A554
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D6C4_2_0000000180008D6C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029D904_2_0000000180029D90
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032E144_2_0000000180032E14
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018004363C4_2_000000018004363C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180048E5A4_2_0000000180048E5A
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180036E704_2_0000000180036E70
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015EA04_2_0000000180015EA0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800176E44_2_00000001800176E4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003E7044_2_000000018003E704
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800167444_2_0000000180016744
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002FF504_2_000000018002FF50
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180024F604_2_0000000180024F60
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000AF744_2_000000018000AF74
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800097A84_2_00000001800097A8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800197C04_2_00000001800197C0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2E7E444_2_0000018C5E2E7E44
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2C6E744_2_0000018C5E2C6E74
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2BBF484_2_0000018C5E2BBF48
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2BA77C4_2_0000018C5E2BA77C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2C57C04_2_0000018C5E2C57C0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2CA7944_2_0000018C5E2CA794
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2DAFF04_2_0000018C5E2DAFF0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2D6FE04_2_0000018C5E2D6FE0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2CB4504_2_0000018C5E2CB450
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2EC4DC4_2_0000018C5E2EC4DC
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2B9D404_2_0000018C5E2B9D40
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2C35244_2_0000018C5E2C3524
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2DAD644_2_0000018C5E2DAD64
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2EC2684_2_0000018C5E2EC268
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2BB2E84_2_0000018C5E2BB2E8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2C4B744_2_0000018C5E2C4B74
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2C68744_2_0000018C5E2C6874
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2E407C4_2_0000018C5E2E407C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2C404C4_2_0000018C5E2C404C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2EE0604_2_0000018C5E2EE060
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2F39E44_2_0000018C5E2F39E4
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018004437C10_2_000000018004437C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003778810_2_0000000180037788
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800147EC10_2_00000001800147EC
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018002600C10_2_000000018002600C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018002A01C10_2_000000018002A01C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001902010_2_0000000180019020
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018004783410_2_0000000180047834
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001307810_2_0000000180013078
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003D08C10_2_000000018003D08C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018002689010_2_0000000180026890
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800158A010_2_00000001800158A0
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800330A810_2_00000001800330A8
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003A90410_2_000000018003A904
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003D91C10_2_000000018003D91C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001B92410_2_000000018001B924
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001B13810_2_000000018001B138
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003713C10_2_000000018003713C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800329B410_2_00000001800329B4
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800279B810_2_00000001800279B8
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180042A1010_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180045A6010_2_0000000180045A60
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003327810_2_0000000180033278
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001F28C10_2_000000018001F28C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003B29410_2_000000018003B294
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001FA9C10_2_000000018001FA9C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800462C410_2_00000001800462C4
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018000A31410_2_000000018000A314
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180013BA010_2_0000000180013BA0
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800193F010_2_00000001800193F0
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800423EC10_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001A47C10_2_000000018001A47C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003B50810_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001255010_2_0000000180012550
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003A55410_2_000000018003A554
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180008D6C10_2_0000000180008D6C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180029D9010_2_0000000180029D90
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180032E1410_2_0000000180032E14
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018004363C10_2_000000018004363C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180048E5A10_2_0000000180048E5A
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180036E7010_2_0000000180036E70
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180015EA010_2_0000000180015EA0
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800176E410_2_00000001800176E4
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018003E70410_2_000000018003E704
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018001674410_2_0000000180016744
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018002FF5010_2_000000018002FF50
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180024F6010_2_0000000180024F60
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018000AF7410_2_000000018000AF74
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800097A810_2_00000001800097A8
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_00000001800197C010_2_00000001800197C0
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D8AD6410_2_0000018394D8AD64
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D69D4010_2_0000018394D69D40
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D7352410_2_0000018394D73524
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D76E7410_2_0000018394D76E74
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D97E4410_2_0000018394D97E44
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D8AFF010_2_0000018394D8AFF0
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D757C010_2_0000018394D757C0
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D86FE010_2_0000018394D86FE0
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D6A77C10_2_0000018394D6A77C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D7A79410_2_0000018394D7A794
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D6BF4810_2_0000018394D6BF48
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D9407C10_2_0000018394D9407C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D7687410_2_0000018394D76874
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D9E06010_2_0000018394D9E060
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D7404C10_2_0000018394D7404C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394DA39E410_2_0000018394DA39E4
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D6B2E810_2_0000018394D6B2E8
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D9C26810_2_0000018394D9C268
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D74B7410_2_0000018394D74B74
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D9C4DC10_2_0000018394D9C4DC
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D7B45010_2_0000018394D7B450
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180007B54 appears 51 times
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180007B1C appears 114 times
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 000000018002CC54 appears 117 times
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 00000001800389F4 appears 48 times
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 00000001800020F0 appears 42 times
          Source: C:\Windows\System32\loaddll64.exeCode function: String function: 000000018002CC54 appears 39 times
          Source: C:\Windows\System32\loaddll64.exeCode function: String function: 0000000180007B1C appears 38 times
          Source: C:\Windows\System32\loaddll64.exeCode function: String function: 00007FF8A8CB7E10 appears 61 times
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2836 -s 464
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSES.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSAR.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSZHT.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSCS.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSDE.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSEL.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenamenView.dllf# vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSFI.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSFR.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSHE.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSHU.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSIT.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSJA.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSKO.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSNL.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSNO.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSPL.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSPTB.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSRU.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSSK.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSSV.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSTH.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSTR.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSUK.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSSL.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSZHC.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSDA.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSESM.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSPT.dllV vs TiNgny4xSB.dll
          Source: classification engineClassification label: mal92.troj.evad.winDLL@119/14@3/2
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB7720 GetLastError,FormatMessageW,LocalFree,0_2_00007FF8A8CB7720
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D83010 CoInitialize,CoCreateInstance,0_2_00007FF8A8D83010
          Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\NTUSER.DAT.NotJump to behavior
          Source: C:\Windows\System32\rundll32.exeMutant created: NULL
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4768
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6408
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2836
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3224:120:WilError_03
          Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5aec9c45-0faf-46a7-b2ba-4184f90f78a1Jump to behavior
          Source: TiNgny4xSB.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktop
          Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\TiNgny4xSB.dll"
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktop
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2836 -s 464
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopInfos
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6408 -s 488
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktops
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4768 -s 488
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMAddNewDesktop
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopInfos
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktops
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nviewExecute
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUnload
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUninstallNotify
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewLoadHook
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewCmd
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMSetSettingHWND
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMParseSetting
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMUpdate
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSetStartupProfile
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSave
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLock
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadEx
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadApp
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoad
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMImport
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetStartupProfile
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoEx
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfo
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileDirectory
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetCurrentProfile
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMFindProfile
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMEnum
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMDelete
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktopJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopInfosJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopsJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMAddNewDesktopJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopInfosJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopsJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nviewExecuteJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUnloadJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUninstallNotifyJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewLoadHookJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewCmdJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMSetSettingHWNDJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMParseSettingJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMUpdateJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSetStartupProfileJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSaveJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLockJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadExJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadAppJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMImportJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetStartupProfileJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoExJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileDirectoryJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetCurrentProfileJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMFindProfileJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMEnumJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMDeleteJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: msimg32.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: TiNgny4xSB.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: TiNgny4xSB.dllStatic PE information: Image base 0x180000000 > 0x60000000
          Source: TiNgny4xSB.dllStatic file information: File size 3112960 > 1048576
          Source: TiNgny4xSB.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x16ea00
          Source: TiNgny4xSB.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x111800
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: TiNgny4xSB.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: iew\v200\_out\x64-Release\nView64.pdb source: loaddll64.exe, 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2805679611.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.2807177411.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2806913781.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2264712764.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2243840484.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2236198947.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2250291096.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2258720451.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2257070968.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.4048457659.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2260513992.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2261541384.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2264374518.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2261619564.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2247132181.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2258515346.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2260396831.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2261727610.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2263668707.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2263673097.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2248812923.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.2262399294.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.2259282916.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000026.00000002.2256871278.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2238385048.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.2256211385.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, TiNgny4xSB.dll
          Source: Binary string: D:\workspace\workspace\nViewBranchBcDQ%ag&CC(NuA9u@W@o$iew\v200\_out\x64-Release\nView64.pdbU source: loaddll64.exe, 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2805679611.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.2807177411.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2806913781.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2264712764.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2243840484.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2236198947.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2250291096.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2258720451.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2257070968.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.4048457659.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2260513992.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2261541384.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2264374518.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2261619564.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2247132181.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2258515346.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2260396831.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2261727610.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2263668707.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2263673097.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2248812923.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.2262399294.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.2259282916.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000026.00000002.2256871278.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2238385048.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.2256211385.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmp, TiNgny4xSB.dll
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D9AC30 LoadLibraryW,GetProcAddress,MonitorFromPoint,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,GetDC,GetDeviceCaps,ReleaseDC,GetDC,GetDeviceCaps,ReleaseDC,0_2_00007FF8A8D9AC30
          Source: TiNgny4xSB.dllStatic PE information: real checksum: 0x259992 should be: 0x2f8529
          Source: TiNgny4xSB.dllStatic PE information: section name: _RDATA
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002CF10 push rsp; iretd 0_2_000000018002CF11
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001BE22AD8D98 push ebp; iretd 0_2_000001BE22AD8D9C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002CF10 push rsp; iretd 3_2_000000018002CF11
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020CA6568D98 push ebp; iretd 3_2_0000020CA6568D9C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002CF10 push rsp; iretd 4_2_000000018002CF11
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000018C5E2C8D98 push ebp; iretd 4_2_0000018C5E2C8D9C
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_000000018002CF10 push rsp; iretd 10_2_000000018002CF11
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000018394D78D98 push ebp; iretd 10_2_0000018394D78D9C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBE750 MessageBoxW,lstrlenW,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetForegroundWindow,PostMessageW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendMessageW,0_2_00007FF8A8CBE750
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800329B4 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00000001800329B4
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\System32\loaddll64.exeCode function: GetCurrentProcessId,GetCommandLineW,GetModuleFileNameW,CharLowerW,GetCommandLineW,CommandLineToArgvW,LocalFree,StrStrIW,GetFileVersionInfoSizeW,GetFileVersionInfoW,VerQueryValueW,_invalid_parameter_noinfo_noreturn,StrStrIW,0_2_00007FF8A8CB4ED0
          Source: C:\Windows\System32\loaddll64.exeAPI coverage: 1.5 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 6.8 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 7.6 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 6.9 %
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CC0B20 FindFirstFileW,lstrcmpW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF8A8CC0B20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CC0EC0 FindFirstFileW,FindClose,0_2_00007FF8A8CC0EC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB44E5 GetCommandLineW,CommandLineToArgvW,lstrcmpW,lstrcmpW,GetCurrentProcess,IsWow64Process,MessageBoxW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindFirstFileW,FindClose,GetTempFileNameW,CopyFileW,lstrcmpW,lstrcmpW,FindWindowW,SendMessageW,IsWindow,PostMessageW,SHDeleteKeyW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,LocalFree,0_2_00007FF8A8CB44E5
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CBBD20 RegOpenKeyExW,RegQueryValueExW,RegCloseKey,MessageBoxW,ShellExecuteW,GetSystemDirectoryW,wsprintfW,FindFirstFileW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF8A8CBBD20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CA0760 RegQueryValueExW,RegCloseKey,GetSystemInfo,MapViewOfFileEx,CloseHandle,CloseHandle,0_2_00007FF8A8CA0760
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TiN_4bec5a90a1db412c7f3be65d6f4f1f3894fd97_8f532422_74e808d9-5170-4b2e-8593-f3e5947d537b\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TiN_04504176a318ef6a4711c8eb84999e6f6eb1_8f532422_9062deff-fe07-4994-bd6a-5e42f06b1cb1\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
          Source: rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWu
          Source: Amcache.hve.8.drBinary or memory string: VMware
          Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.8.drBinary or memory string: vmci.sys
          Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.8.drBinary or memory string: VMware20,1
          Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end nodegraph_0-95111
          Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end nodegraph_0-94947
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D3BAA0 RtlCaptureContext,VirtualAlloc,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF8A8D3BAA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003EEEC EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_000000018003EEEC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D9AC30 LoadLibraryW,GetProcAddress,MonitorFromPoint,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,GetDC,GetDeviceCaps,ReleaseDC,GetDC,GetDeviceCaps,ReleaseDC,0_2_00007FF8A8D9AC30
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180036780 GetProcessHeap,0_2_0000000180036780
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8D3BAA0 RtlCaptureContext,VirtualAlloc,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF8A8D3BAA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000000180032DD8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000000180032DD8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0000000180032DD8
          Source: C:\Windows\System32\rundll32.exeCode function: 10_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0000000180032DD8

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.46.11 8817
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.40.41 8817
          Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\explorer.exe base: 1230000 protect: page execute and read and write
          Source: C:\Windows\System32\rundll32.exeThread created: unknown EIP: 1230000
          Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 1230000 value starts with: 4D5A
          Source: C:\Windows\System32\rundll32.exeMemory written: PID: 1028 base: 1230000 value: 4D
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4768
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4768
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4768
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4768
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4768
          Source: C:\Windows\System32\rundll32.exeThread register set: 4768 1
          Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 1230000
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CA04D0 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LocalFree,CreateFileMappingW,GetLastError,FreeSid,LocalFree,LocalFree,0_2_00007FF8A8CA04D0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CA04D0 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LocalFree,CreateFileMappingW,GetLastError,FreeSid,LocalFree,LocalFree,0_2_00007FF8A8CA04D0
          Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoEx,0_2_00007FF8A8CF5624
          Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,0_2_00000001800354AC
          Source: C:\Windows\System32\loaddll64.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,0_2_00000001800400E0
          Source: C:\Windows\System32\loaddll64.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,0_2_000000018002E394
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,0_2_00000001800423EC
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,0_2_00000001800384A0
          Source: C:\Windows\System32\loaddll64.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,0_2_000000018004064C
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,0_2_0000000180042858
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,0_2_000000018004290C
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,0_2_0000000180042A10
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,EnumSystemLocalesW,0_2_0000000180042D88
          Source: C:\Windows\System32\loaddll64.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,0_2_0000000180040DB0
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,EnumSystemLocalesW,0_2_0000000180042E3C
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,0_2_0000000180042ED0
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,0_2_0000000180043100
          Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_000000018004324C
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,GetLocaleInfoW,0_2_00000001800432FC
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,0_2_00000001800433A4
          Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_00000001800353EC
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_000000018003B508
          Source: C:\Windows\System32\loaddll64.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,0_2_00000001800298D8
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,0_2_00000001800419E8
          Source: C:\Windows\System32\loaddll64.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_0000000180041B54
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,0_2_000001BE22AFC4DC
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,3_2_00000001800354AC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,3_2_0000000180042858
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,3_2_00000001800298D8
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,3_2_00000001800400E0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,3_2_0000000180043100
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,3_2_000000018004290C
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,3_2_00000001800419E8
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,3_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_000000018004324C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,3_2_00000001800432FC
          Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_0000000180041B54
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,3_2_000000018002E394
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,3_2_00000001800433A4
          Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_00000001800353EC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,3_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,3_2_00000001800384A0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,3_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,3_2_0000000180042D88
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,3_2_0000000180040DB0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,3_2_0000000180042E3C
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,3_2_000000018004064C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,3_2_0000000180042ED0
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,3_2_0000020CA659382C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,3_2_0000020CA658C4DC
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,3_2_0000020CA657A8AC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,3_2_0000020CA65939E4
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,4_2_00000001800354AC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,4_2_0000000180042858
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,4_2_00000001800298D8
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,4_2_00000001800400E0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,4_2_0000000180043100
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,4_2_000000018004290C
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,4_2_00000001800419E8
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,4_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_000000018004324C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,4_2_00000001800432FC
          Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,4_2_0000000180041B54
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,4_2_000000018002E394
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,4_2_00000001800433A4
          Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,4_2_00000001800353EC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,4_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,4_2_00000001800384A0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,4_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,4_2_0000000180042D88
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,4_2_0000000180040DB0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,4_2_0000000180042E3C
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,4_2_000000018004064C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,4_2_0000000180042ED0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,4_2_0000018C5E2EC4DC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,4_2_0000018C5E2F382C
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,4_2_0000018C5E2DA8AC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,4_2_0000018C5E2F39E4
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,10_2_00000001800354AC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,10_2_0000000180042858
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,10_2_00000001800298D8
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,10_2_00000001800400E0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,10_2_0000000180043100
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,10_2_000000018004290C
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,10_2_00000001800419E8
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,10_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_000000018004324C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,10_2_00000001800432FC
          Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,10_2_0000000180041B54
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,10_2_000000018002E394
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,10_2_00000001800433A4
          Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,10_2_00000001800353EC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,10_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,10_2_00000001800384A0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,10_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,10_2_0000000180042D88
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,10_2_0000000180040DB0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,10_2_0000000180042E3C
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,10_2_000000018004064C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,10_2_0000000180042ED0
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,10_2_0000018394D8A8AC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,10_2_0000018394DA382C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,10_2_0000018394DA39E4
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,10_2_0000018394D9C4DC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180039844 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0000000180039844
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003E704 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,_malloc_crt,_invoke_watson,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_000000018003E704
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8A8CB6A40 GetModuleHandleA,GetProcAddress,GetVersionExW,0_2_00007FF8A8CB6A40
          Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000017.00000002.3985806152.000001CE5002C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000017.00000002.3985806152.000001CE500D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000017.00000002.4024711141.000001CE50158000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6496, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000017.00000002.3985806152.000001CE5002C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000017.00000002.3985806152.000001CE500D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000017.00000002.4024711141.000001CE50158000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6496, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Valid Accounts
          1
          Native API
          1
          Valid Accounts
          1
          Valid Accounts
          1
          Masquerading
          11
          Input Capture
          2
          System Time Discovery
          Remote Services11
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Access Token Manipulation
          1
          Valid Accounts
          LSASS Memory151
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)811
          Process Injection
          1
          Access Token Manipulation
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          1
          Virtualization/Sandbox Evasion
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script811
          Process Injection
          LSA Secrets2
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials14
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Rundll32
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          DLL Side-Loading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576561 Sample: TiNgny4xSB.dll Startdate: 17/12/2024 Architecture: WINDOWS Score: 92 29 muuxxu.com 2->29 31 cronoze.com 2->31 37 Yara detected BruteRatel 2->37 39 AI detected suspicious sample 2->39 8 loaddll64.exe 2 2->8         started        signatures3 process4 signatures5 41 Contains functionality to compare user and computer (likely to detect sandboxes) 8->41 11 rundll32.exe 8->11         started        15 rundll32.exe 1 8->15         started        17 rundll32.exe 1 8->17         started        19 28 other processes 8->19 process6 dnsIp7 33 cronoze.com 94.232.40.41, 49713, 49741, 8817 WELLWEBNL Russian Federation 11->33 35 muuxxu.com 94.232.46.11, 49870, 49980, 8817 WELLWEBNL Russian Federation 11->35 43 System process connects to network (likely due to code injection or exploit) 11->43 45 Injects code into the Windows Explorer (explorer.exe) 11->45 47 Sets debug register (to hijack the execution of another thread) 11->47 49 5 other signatures 11->49 21 WerFault.exe 20 16 15->21         started        23 WerFault.exe 16 17->23         started        25 WerFault.exe 16 19->25         started        27 rundll32.exe 2 19->27         started        signatures8 process9

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          TiNgny4xSB.dll5%ReversingLabsWin64.Trojan.Seheq
          TiNgny4xSB.dll3%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          muuxxu.com1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://muuxxu.com:8817/intel.php.P0%Avira URL Cloudsafe
          https://muuxxu.com/0%Avira URL Cloudsafe
          http://r11.o.lencr.org0#0%Avira URL Cloudsafe
          https://cronoze.com/0%Avira URL Cloudsafe
          https://cronoze.com:8817/pentium.phpZ0%Avira URL Cloudsafe
          https://muuxxu.com:8817/intel.php0%Avira URL Cloudsafe
          https://muuxxu.com:8817/0%Avira URL Cloudsafe
          https://cronoze.com/1%VirustotalBrowse
          https://muuxxu.com:8817/intel.php2P0%Avira URL Cloudsafe
          https://muuxxu.com/1%VirustotalBrowse
          https://cronoze.com:8817/pentium.php0%Avira URL Cloudsafe
          https://muuxxu.com:8817/intel.phpDQd0%Avira URL Cloudsafe
          https://cronoze.com:8817/pentium.php%P0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          cronoze.com
          94.232.40.41
          truetrue
            unknown
            muuxxu.com
            94.232.46.11
            truetrueunknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://cronoze.com:8817/pentium.phpZrundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://muuxxu.com/rundll32.exe, 00000017.00000003.3675415250.000001CE4C3C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973830358.000001CE4C3C3000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://muuxxu.com:8817/intel.php.Prundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://r11.o.lencr.org0#rundll32.exe, 00000017.00000003.3675200688.000001CE5030A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3985806152.000001CE5010D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2454930078.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973864275.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.4025680363.000001CE5030A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://cronoze.com/rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://muuxxu.com:8817/intel.phprundll32.exe, 00000017.00000003.3675415250.000001CE4C3C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973830358.000001CE4C3C3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://x1.c.lencr.org/0rundll32.exe, 00000017.00000003.3675200688.000001CE5030A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2454930078.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973864275.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.4025680363.000001CE5030A000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://x1.i.lencr.org/0rundll32.exe, 00000017.00000003.3675200688.000001CE5030A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2454930078.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973864275.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.4025680363.000001CE5030A000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://muuxxu.com:8817/rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://muuxxu.com:8817/intel.php2Prundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://upx.sf.netAmcache.hve.8.drfalse
                  high
                  https://cronoze.com:8817/pentium.phprundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://muuxxu.com:8817/intel.phpDQdrundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://r11.i.lencr.org/0rundll32.exe, 00000017.00000003.3675200688.000001CE5030A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C318000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675415250.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973586525.000001CE4C371000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2455009623.000001CE4C379000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973788981.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3985806152.000001CE5010D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.2454930078.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3675336606.000001CE4C3D9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.3973864275.000001CE4C3D5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.4025680363.000001CE5030A000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://cronoze.com:8817/pentium.php%Prundll32.exe, 00000017.00000003.2455009623.000001CE4C3A4000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    94.232.46.11
                    muuxxu.comRussian Federation
                    44477WELLWEBNLtrue
                    94.232.40.41
                    cronoze.comRussian Federation
                    44477WELLWEBNLtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1576561
                    Start date and time:2024-12-17 09:28:11 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 10m 18s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Run name:Run with higher sleep bypass
                    Number of analysed new started processes analysed:42
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:TiNgny4xSB.dll
                    renamed because original name is a hash value
                    Original Sample Name:1552c43ecf6eeb5e2fe13cc1c25e6bdacf227222afaa9a523d996b6331945505.exe
                    Detection:MAL
                    Classification:mal92.troj.evad.winDLL@119/14@3/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 4
                    • Number of non-executed functions: 151
                    Cookbook Comments:
                    • Found application associated with file extension: .dll
                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.182.143.212, 40.126.53.21, 13.107.246.63, 4.175.87.197
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report creation exceeded maximum time and may have missing disassembly code information.
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    No simulations
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    WELLWEBNLavutil.dll.dllGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.224
                    fes.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                    • 94.232.43.224
                    wait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                    • 94.232.43.224
                    sqx.dll.dllGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    merd.msiGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    sqx.dll.dllGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    Document-19-06-38.jsGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.213
                    WELLWEBNLavutil.dll.dllGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.224
                    fes.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                    • 94.232.43.224
                    wait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                    • 94.232.43.224
                    sqx.dll.dllGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    merd.msiGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    sqx.dll.dllGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    Document-19-06-38.jsGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.213
                    No context
                    No context
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.8199298295818681
                    Encrypted:false
                    SSDEEP:96:Wn1JFMd/ilyKy6Osj+4Rvd+qzfxbQXIDcQ/c65kcEqcw3kXaXz+HbHgSQgJjFEws:gSily6O220R9kweji/zuiFdZ24lO8F
                    MD5:21837392354DC60E1A5FAF561B2A967E
                    SHA1:8F49189EC51C38320C618188CFD37CE2B41FC197
                    SHA-256:8138B8EE8ECA8111C2BC334266AFB881156429C74205AB21ADD309BB1DFB49FA
                    SHA-512:1DE5FCA93FA00004E1D251A7E33C37978D8A354C078B753B31472E5AF42C9344005D77F53768962018E7E273D2839F7063EF1B5E3E1BB0E926B92C84E7B05A70
                    Malicious:false
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.9.7.7.5.2.8.0.1.4.2.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.9.7.7.5.3.0.3.5.8.0.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.6.2.d.e.f.f.-.f.e.0.7.-.4.9.9.4.-.b.d.6.a.-.5.e.4.2.f.0.6.b.1.c.b.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.4.a.e.0.0.c.3.-.1.f.e.d.-.4.8.7.5.-.8.9.d.f.-.4.5.6.0.4.7.e.7.a.7.7.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.T.i.N.g.n.y.4.x.S.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.a.0.-.0.0.0.1.-.0.0.1.4.-.e.5.0.4.-.d.3.b.f.5.d.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.8197107566117785
                    Encrypted:false
                    SSDEEP:96:WC71LF7/iFyKy6Ksj+4Rvd+qzfzQXIDcQCc6qPcEDcw3W2RXaXz+HbHgSQgJjFEr:XRiFy6K2408wJi2Zji/zuiFdZ24lO8F
                    MD5:B903635C1309F00209F90E25F4828C68
                    SHA1:CB2B9C45BDFD1FE7B91B8979F64E2BD7F65A495C
                    SHA-256:BD745E9F3924902043A54E4DC8D62A6599EE639D5357135769F1F059B6E9AE89
                    SHA-512:3955DB477A9B6E0B3B18AE1D8BF1758B88737CB55D7F7896D85D1F63D5B1A4EB8A30BA13AE8398C349B9734AA310E9C1B8B8352F4043D600FF93C80690753002
                    Malicious:false
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.9.7.7.4.9.2.6.6.3.3.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.9.7.7.4.9.5.3.1.9.6.0.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.b.7.c.9.5.6.d.-.4.5.c.8.-.4.f.1.1.-.8.b.2.7.-.b.f.e.f.f.6.3.e.a.b.b.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.1.4.1.2.4.2.0.-.1.5.2.4.-.4.6.5.d.-.8.f.1.4.-.e.f.3.a.f.b.4.5.9.e.2.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.T.i.N.g.n.y.4.x.S.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.0.8.-.0.0.0.1.-.0.0.1.4.-.7.6.0.d.-.0.7.b.e.5.d.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.8198480932475907
                    Encrypted:false
                    SSDEEP:96:WS1rFZCG/igyKyQsj+4Rvd+qzfWQXIDcQ/c65kcE/cw3zXaXz+HbHgSQgJjFEwIL:1BigyQ210R9k1/ji/zuiFdZ24lO8F
                    MD5:120F230D5AD55A3CAC3AD16C5AFE4E67
                    SHA1:0E30DE98556F7795860D1F91E5545C400C36857B
                    SHA-256:8A748A846EC26B2959CCA7995EC308F99A782A4A5761FAFB853D412748197F48
                    SHA-512:A0E82B220390F73B0C31EAA67A24D5FE27A358EF7916513C59EF0FCDFAC954BAE1C67D00F55DCA476B7ADB6F4B8A3277608A0039FD4CC7D5602BDB1ADDA919DB
                    Malicious:false
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.9.7.7.4.6.5.7.2.4.8.9.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.9.7.7.4.6.9.3.1.8.6.0.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.c.2.6.9.d.4.-.7.d.7.c.-.4.a.a.6.-.8.f.e.c.-.1.1.4.9.d.e.4.1.3.3.1.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.9.2.d.d.d.1.6.-.0.1.4.f.-.4.1.3.d.-.8.8.c.d.-.5.0.8.3.7.f.1.1.b.0.c.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.T.i.N.g.n.y.4.x.S.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.1.4.-.0.0.0.1.-.0.0.1.4.-.6.a.5.6.-.3.a.b.c.5.d.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 08:29:06 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):59132
                    Entropy (8bit):1.679614107756674
                    Encrypted:false
                    SSDEEP:96:5T8JCft5k5f1vZTfcTxnGXEoM+F+bZU1doi7MxCRVp8vVWS4OEoEbZPyZtHSCC9N:60tVnGXNWkqOM+8vVWLOEbZoPn4Kr+n
                    MD5:B39D0F60C0B2CD05D47652D4A1863288
                    SHA1:B86A0CD3DB1E6A5EDCC7D78318868FFA8A8AAFB1
                    SHA-256:078828738AF8534CEF377BD83AB63E8F593C5CD4B0BA2C0FA775A413FA73AC16
                    SHA-512:B2953C069A3C136799CBD6334D2D17C7EA01A288EB01D19BD5949F9504B13734BE11C8638801A152C5BB5FAEC8353DBC7E9D5697A902FB0D11129AF07E7851E5
                    Malicious:false
                    Preview:MDMP..a..... .......R6ag........................................f-..........T.......8...........T...............d...........H...........4...............................................................................eJ..............Lw......................T...........Q6ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8542
                    Entropy (8bit):3.6995014921781055
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJCr4S1c6YRhhgmfGPv0prM89bOlyfD6m:R6lXJOLu6YHhgmfGPvIOgfv
                    MD5:3503F3711C53B66B7D34A14860DA191D
                    SHA1:823BA8D8FBCBF547B1A655B5AE905B07507D1AD1
                    SHA-256:2B06FD78E9A4615D9228E430C8CB1C4A80C48E919ECDCF45F956AFEEFE77A15A
                    SHA-512:9F464CCCA34192955F793BF4ACAFE04811A623EEEA42E25986F26CDD980F1EE6CC860BC38E95E797A32BF5BAF14D2D89110E6C8E8E9A8E85860E510D217DA852
                    Malicious:false
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.3.6.<./.P.i.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4765
                    Entropy (8bit):4.500675523704529
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zs+Jg771I95uWpW8VY9Ym8M4JCWOCWcXQYFXIyq85mWOKsoptSTSvd:uIjf0I7WP7VtJFIspoOvd
                    MD5:B37AF6F2ADA3A3D7B183686C1D0F55A9
                    SHA1:B912E1067E51134BA69B9AF33A2F50A6675DF965
                    SHA-256:DF406C6A37DC5CE08DB3BF2994FADC6C37CFE261A55CCBD5E881357D13BF23E9
                    SHA-512:20C70D928060ECD2C0AA344B17E8246BF0F1DE8E3D8B45707E53FCADE7168C3177E98F4D50AC61CE5DB1A03B6E457284858AF57070FF55593B45038F8C14C3B8
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635011" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 08:29:09 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):59172
                    Entropy (8bit):1.6914223773606758
                    Encrypted:false
                    SSDEEP:192:NLAnGXNrqXOMb24JQhnZeH/QA5+ai9Fin:yqrziT40/j5+ai9FC
                    MD5:89797B005BB6F1C50B9908FCEEC0932F
                    SHA1:A14C69D468F263353770C57D99B21D428BDAB7D5
                    SHA-256:F64F7F926C7258314F07A19CEF216B08C29FFBDE10729D5AC9DE4C937D659B78
                    SHA-512:0781E308924FCF0AB517B2836F7A5D4448294F69BFAB71E4D142155071EC6FD05D4FC6E41827C371BA07A56C2A2DA08052F149D75A4EEA770D9D557260D62BF9
                    Malicious:false
                    Preview:MDMP..a..... .......U6ag........................................f-..........T.......8...........T...........................H...........4...............................................................................eJ..............Lw......................T...........T6ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8544
                    Entropy (8bit):3.704238780460812
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJnH4S16YR/hgmfGYd2yprw89bJvzfijm:R6lXJHL16YZhgmfGYd2KJ7f/
                    MD5:81B477EC0A8E03B7933E7BF5A21E90CC
                    SHA1:11882401F618A68D8849E9CADDEDC96967F6A85B
                    SHA-256:68C7A7A8098AD77C70829B7B4546B03E6215E30D384132914A2AFA72078D6874
                    SHA-512:3313C6FD966E6D672454E5BFE8E3F33193B6FA6F791DDA1684A6D7B6EC319E58E327805D8C4E26E10F3FEBB6656428D8798B780A63B1B4695BA29874F6DF8069
                    Malicious:false
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.0.8.<./.P.i.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4765
                    Entropy (8bit):4.501346789155402
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zs+Jg771I95uWpW8VYlYm8M4JCWOCWcXQfF93yq85mWOKsAptSTSwd:uIjf0I7WP7V9Jo0poOwd
                    MD5:A805C11AF15AF473578973E6D2B713E0
                    SHA1:50DC0A6D3FA1412F130E200D5A0DAF41CB17366C
                    SHA-256:733FFED9067280B88630141C22EF2CEC51FFD5642394A8ADA1F56C7AAB364AD7
                    SHA-512:95A8F1538910DA7357AB7CAE32477F92EE79825A301931EF7E799C30ABB4616D65F37F0BE5F55994FA1AE1B26312EDEF4602439DA6F080A3B775CEE1FF99C9CA
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635011" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 08:29:12 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):70948
                    Entropy (8bit):1.5431716270914575
                    Encrypted:false
                    SSDEEP:192:Ip4kGX58YFu8XOM52FNdyny7nCIygfjvyn:64kM8kuBwCdyy7nCIygfDS
                    MD5:881F3525232147404B1CB2053AF2EC23
                    SHA1:63D41801DA015E46C1D84DA15A6641CE15368AF7
                    SHA-256:232B1B549D362E0720C736A71F64AE92AE0A59C24F2C140808C27AD3B25B11C6
                    SHA-512:E2BC4FC01746749694590BA44BC8ADD6D8CD1CDA8F828530B31EDE750A4434757E501F5FB89CD8300655DFC81A073CE7A10E63A52CE86266CAB306003F024941
                    Malicious:false
                    Preview:MDMP..a..... .......X6ag....................................T...f2..........T.......8...........T...........................x...........d...............................................................................eJ..............Lw......................T...........W6ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8544
                    Entropy (8bit):3.7015778647585855
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJICpI6YRWhgmfGivuprO89bbMRf3vpm:R6lXJ1pI6YwhgmfGivcbSfM
                    MD5:F9CC9A1EDF034EBA15F9A33B886C1BF1
                    SHA1:B2CB5303106A51C018ABF71CCE2C6F9FDFAF44A6
                    SHA-256:F65997FA5D14403380EBF46A25D9A3798FD53984BB691AFF7F090DFA3BD0B7B1
                    SHA-512:6DC35DEC267427E14B51632E212A0B37401C5F744FFBB26B7C5FAEC595B1C0D4A12B40830996BD2BECB1B9DFAA17FEC16FC25AD09112A595C0260706ED4839B1
                    Malicious:false
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.6.8.<./.P.i.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4765
                    Entropy (8bit):4.500235410253904
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zs+Jg771I95uWpW8VY+Ym8M4JCWOCWcXQNFbhyq85mWOKspl2ptSTSkd:uIjf0I7WP7V2JKdl2poOkd
                    MD5:EF0CF10FA0889AC0173BADA46FD6C77C
                    SHA1:7499E0E9858A6BAD3AE70191B23D17D564F169C2
                    SHA-256:3C39FD67594C31C5DE7D5AD50A774D37DF409C0454632A5CD83E1FE98D578B8D
                    SHA-512:4ABEE8C6F8B5F5EA6BCD1E8377F8C716EEC68BE195449550A9A720383C1F8DD554410E2445FF915C78AF8D469D0DC3D13D34F4C5CFB6B7A4860E3718FF9B23B8
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635011" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):100
                    Entropy (8bit):5.285560690183442
                    Encrypted:false
                    SSDEEP:3:V+Q+50RFazdGmTEg/9sB3b2QBYa1LpPV:hOU4YBg/9Sr2QV1lt
                    MD5:C7DA444D9AF0C69FB2DB5A95F74072E1
                    SHA1:6EE99C8B426B891F11B7CEAEAB62D909DE5CFE34
                    SHA-256:333EC1C8BE3C4793850AE2DAAF98755D1BAB2281A22CA6605D1C126F26086236
                    SHA-512:88F280946BAE4307AE623EA9483735594DB3C7C17BD0A04E80ACD4190602FB2D621CD69D93D7ED135F2F8012DD6E1E3D8E9FAEB739A1144CB26B4DED30948C67
                    Malicious:false
                    Preview:{VGlOZ255NHhTQi5kbGw=, IkM6XFVzZXJzXGFsZm9uc1xEZXNrdG9wXFRpTmdueTR4U0IuZGxsIg==, MQ==, blZpZXdDbWQ=}
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.422420953060224
                    Encrypted:false
                    SSDEEP:6144:oSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNa0uhiTw:zvloTMW+EZMM6DFy003w
                    MD5:0AD6694AD1EEE92D6268FF51F9D2FCDF
                    SHA1:C5B9E848558550D109F8A0D248BF5B135CF4ED83
                    SHA-256:84D48FFB787A4F1ACFB5AFC657C9EBBED012FB6AEC9F2F932394DA903AE18B12
                    SHA-512:6CAE45B0ADC0FC4719886D9761B0713A910F121D53DEB2D99558105022D4F3D6C5A3F415EB5617B071D9BC9D928FA8EC4A5B978E09DBA580855A74134A6EBFD2
                    Malicious:false
                    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....]P...............................................................................................................................................................................................................................................................................................................................................5..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Entropy (8bit):7.017969386306067
                    TrID:
                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                    • Win64 Executable (generic) (12005/4) 10.17%
                    • Generic Win/DOS Executable (2004/3) 1.70%
                    • DOS Executable Generic (2002/1) 1.70%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                    File name:TiNgny4xSB.dll
                    File size:3'112'960 bytes
                    MD5:e5ec8b7cf88c66f78d607f76a2095fda
                    SHA1:fda7752c604ff7673ae31dc45a8f0a9dd0a3a6ac
                    SHA256:1552c43ecf6eeb5e2fe13cc1c25e6bdacf227222afaa9a523d996b6331945505
                    SHA512:80ddbef4e3e8912b15b2a41a9416041159c305dd24d5e06c62008708e8cf4c307981ce0c96690b9b1fb7dc72634c3f172993ab73b82ac53cce9995b64addb1d3
                    SSDEEP:49152:1x4R6f1w6HKPwqliTUERW+e46IwdKMmMxSp:1+R+wlPwHgEofIwRmyS
                    TLSH:7AE56D827AD72200F1EBE138C9725709C1BA74550B31D5CF46740BBA3A8B7F59A7B392
                    File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$..........xUis+Uis+Uis+..p*_is+..v*.is+3..+Tis+..w*Dis+..p*_is+..v*.is+..z*]is+..w*@is+\..+Wis+\..+Tis+..r*Bis+Uir+.hs+..v*~is+..s*Tis
                    Icon Hash:d2aab9d2faeece37
                    Entrypoint:0x1800c6224
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x180000000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x66CD0BFB [Mon Aug 26 23:12:59 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:3f2962bd80009d147ddac59f9c2b8d66
                    Signature Valid:
                    Signature Issuer:
                    Signature Validation Error:
                    Error Number:
                    Not Before, Not After
                      Subject Chain
                        Version:
                        Thumbprint MD5:
                        Thumbprint SHA-1:
                        Thumbprint SHA-256:
                        Serial:
                        Instruction
                        push eax
                        push ebx
                        push ecx
                        push edx
                        push esi
                        push edi
                        inc ecx
                        push eax
                        inc ecx
                        push ecx
                        inc ecx
                        push edx
                        inc ecx
                        push ebx
                        inc ecx
                        push esp
                        inc ecx
                        push ebp
                        inc ecx
                        push esi
                        inc ecx
                        push edi
                        inc ecx
                        neg eax
                        dec ecx
                        mov ecx, edi
                        dec eax
                        mov ecx, ebp
                        dec esp
                        or eax, eax
                        dec eax
                        mov ecx, edx
                        dec eax
                        xor ecx, eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        add ecx, 31h
                        dec eax
                        and ecx, eax
                        dec eax
                        sub ecx, 00000100h
                        dec eax
                        mov ecx, ebp
                        dec eax
                        dec ecx
                        dec eax
                        sub ecx, edi
                        dec eax
                        xor edi, esi
                        dec eax
                        add eax, 18h
                        xorps xmm0, xmm3
                        inc ecx
                        shr eax, 1
                        dec ecx
                        shr edi, 1
                        inc ecx
                        shr eax, 1
                        dec ecx
                        and ecx, 01h
                        inc ecx
                        and eax, 01h
                        dec eax
                        arpl ax, dx
                        dec eax
                        arpl cx, ax
                        movaps xmm1, xmm6
                        movaps xmm6, xmm1
                        movaps xmm2, xmm6
                        dec ax
                        movd eax, mm2
                        dec eax
                        shr eax, 20h
                        inc esp
                        cmp ecx, ecx
                        inc esp
                        cmp ebx, ecx
                        dec ebp
                        mov ebx, esi
                        cmove edx, ecx
                        mov edx, FFFFFFFFh
                        inc ecx
                        neg eax
                        dec ecx
                        mov ecx, edi
                        dec eax
                        mov ecx, ebp
                        dec esp
                        or eax, eax
                        dec eax
                        mov ecx, edx
                        dec eax
                        xor ecx, eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        add ecx, 31h
                        dec eax
                        and ecx, eax
                        dec eax
                        sub ecx, 00000100h
                        dec eax
                        mov ecx, ebp
                        dec eax
                        dec ecx
                        Programming Language:
                        • [IMP] VS2008 SP1 build 30729
                        • [C++] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x1bfab00x14c8.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1c0f780x104.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1ef0000x111630.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1ce0000x1fa58.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x252c000x4ca0.rsrc
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3010000xfec.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x18bf700x54.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x18c1900x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x18bfd00x138.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x1700000xac0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x16e81c0x16ea0048889f443bb180ec765257c6a2c2883fFalse0.3392624073048074data6.421120250593156IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x1700000x533b60x534003a0c139778b110ba0a849c946e9f1c13False0.3114647850975976data5.393758497191826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x1c40000x9ff00x38007b6aa8f538e1b1738a168895dc8be2adFalse0.24142020089285715data3.9872470975737118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x1ce0000x1fa580x1fc00ddecc75f6a8c9ebe806716df0d89dbacFalse0.45673136072834647data6.202982287474555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        _RDATA0x1ee0000xfc0x200ae28d2bdd6b6dc8316b51d53a0feaccaFalse0.31640625data2.4452015569508707IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x1ef0000x1116300x111800583ea7e3fb4407f6d2c5867487d76bcfFalse0.5867962322897623data7.48608281610237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x3010000xfec0x1000e4b9dec003dda40214237d5924a5ee0fFalse0.4365234375data5.4013704366933375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_BITMAP0x1f02a00x328Device independent bitmap graphic, 16 x -16 x 24, image size 768, resolution 4724 x 4724 px/mEnglishUnited States0.6831683168316832
                        RT_BITMAP0x1f05c80x4d8Device independent bitmap graphic, 20 x -20 x 24, image size 1200, resolution 4724 x 4724 px/mEnglishUnited States0.6629032258064517
                        RT_BITMAP0x1f0aa00x6e8Device independent bitmap graphic, 24 x -24 x 24, image size 1728, resolution 4724 x 4724 px/mEnglishUnited States0.5961538461538461
                        RT_BITMAP0x1f11880x958Device independent bitmap graphic, 28 x -28 x 24, image size 2352, resolution 4724 x 4724 px/mEnglishUnited States0.5556020066889632
                        RT_BITMAP0x1f1ae00xc28Device independent bitmap graphic, 32 x -32 x 24, image size 3072, resolution 4724 x 4724 px/mEnglishUnited States0.41002570694087404
                        RT_BITMAP0x1f27080x1928Device independent bitmap graphic, 40 x -40 x 32, image size 6400, resolution 2835 x 2835 px/mEnglishUnited States0.34767080745341616
                        RT_BITMAP0x1f40300x1b28Device independent bitmap graphic, 48 x -48 x 24, image size 6912, resolution 4724 x 4724 px/mEnglishUnited States0.5100690448791715
                        RT_BITMAP0x1f5b580x30028Device independent bitmap graphic, 256 x 256 x 24, image size 196608, resolution 4724 x 4724 px/mEnglishUnited States0.1254830967007038
                        RT_ICON0x225b800x43f2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9978728297113947
                        RT_ICON0x229f740x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.12925884301431445
                        RT_ICON0x23a79c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.23240434577231933
                        RT_ICON0x23e9c40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.300103734439834
                        RT_ICON0x240f6c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.4017354596622889
                        RT_ICON0x2420140x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6196808510638298
                        RT_STRING0x24247c0x136Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 00.5161290322580645
                        RT_STRING0x2425b40x108Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ArabicSaudi Arabia0.5681818181818182
                        RT_STRING0x2426bc0x98Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ChineseTaiwan0.8092105263157895
                        RT_STRING0x2427540x124Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0CzechCzech Republic0.5273972602739726
                        RT_STRING0x2428780xfcMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0DanishDenmark0.5714285714285714
                        RT_STRING0x2429740x106Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0GermanGermany0.5076335877862596
                        RT_STRING0x242a7c0x15cMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0GreekGreece0.5488505747126436
                        RT_STRING0x242bd80xf0Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0EnglishUnited States0.5541666666666667
                        RT_STRING0x242cc80x126Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0FinnishFinland0.5306122448979592
                        RT_STRING0x242df00x140Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0FrenchFrance0.51875
                        RT_STRING0x242f300xf0Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0HebrewIsrael0.6083333333333333
                        RT_STRING0x2430200x102Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0HungarianHungary0.5891472868217055
                        RT_STRING0x2431240xfeMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ItalianItaly0.5551181102362205
                        RT_STRING0x2432240xceMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0JapaneseJapan0.7427184466019418
                        RT_STRING0x2432f40xa4Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0KoreanNorth Korea0.8109756097560976
                        RT_STRING0x2432f40xa4Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0KoreanSouth Korea0.8109756097560976
                        RT_STRING0x2433980x134Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0DutchNetherlands0.5
                        RT_STRING0x2434cc0x11eMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0NorwegianNorway0.5244755244755245
                        RT_STRING0x2435ec0x11cMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PolishPoland0.5422535211267606
                        RT_STRING0x2437080x14cMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PortugueseBrazil0.4939759036144578
                        RT_STRING0x2438540x138Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0RussianRussia0.5384615384615384
                        RT_STRING0x24398c0x13eMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SlovakSlovakia0.5377358490566038
                        RT_STRING0x243acc0x128Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SwedishSweden0.5236486486486487
                        RT_STRING0x243bf40x102Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ThaiThailand0.624031007751938
                        RT_STRING0x243cf80x178Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0TurkishTurkey0.4787234042553192
                        RT_STRING0x243e700x146Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0UkrainianUkrain0.5521472392638037
                        RT_STRING0x243fb80x124Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SlovenianSlovenia0.541095890410959
                        RT_STRING0x2440dc0x90Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ChineseChina0.7708333333333334
                        RT_STRING0x24416c0xf0Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0EnglishGreat Britain0.5541666666666667
                        RT_STRING0x24425c0x136Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SpanishMexico0.5129032258064516
                        RT_STRING0x2443940x160Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PortuguesePortugal0.4744318181818182
                        RT_STRING0x2444f40x48adata0.35628227194492257
                        RT_STRING0x2449800x396dataArabicSaudi Arabia0.3888888888888889
                        RT_STRING0x244d180x21adataChineseTaiwan0.5204460966542751
                        RT_STRING0x244f340x3d4dataCzechCzech Republic0.3989795918367347
                        RT_STRING0x2453080x3e0dataDanishDenmark0.36189516129032256
                        RT_STRING0x2456e80x468dataGermanGermany0.37145390070921985
                        RT_STRING0x245b500x47adataGreekGreece0.41273996509598604
                        RT_STRING0x245fcc0x38edataEnglishUnited States0.3648351648351648
                        RT_STRING0x24635c0x3d8dataFinnishFinland0.36585365853658536
                        RT_STRING0x2467340x420dataFrenchFrance0.375
                        RT_STRING0x246b540x3ecdataHebrewIsrael0.3754980079681275
                        RT_STRING0x246f400x3ecdataHungarianHungary0.3904382470119522
                        RT_STRING0x24732c0x468dataItalianItaly0.3599290780141844
                        RT_STRING0x2477940x290dataJapaneseJapan0.5091463414634146
                        RT_STRING0x247a240x26cAmigaOS bitmap font "\254\307 ", fc_YSize 24832, 1238 elements, 2nd "a", 3rd " "KoreanNorth Korea0.5290322580645161
                        RT_STRING0x247a240x26cAmigaOS bitmap font "\254\307 ", fc_YSize 24832, 1238 elements, 2nd "a", 3rd " "KoreanSouth Korea0.5290322580645161
                        RT_STRING0x247c900x410dataDutchNetherlands0.36153846153846153
                        RT_STRING0x2480a00x406dataNorwegianNorway0.3592233009708738
                        RT_STRING0x2484a80x406dataPolishPoland0.3941747572815534
                        RT_STRING0x2488b00x466dataPortugueseBrazil0.3614564831261101
                        RT_STRING0x248d180x488dataRussianRussia0.4025862068965517
                        RT_STRING0x2491a00x39adataSlovakSlovakia0.4522776572668113
                        RT_STRING0x24953c0x3c6dataSwedishSweden0.37267080745341613
                        RT_STRING0x2499040x3c2dataThaiThailand0.40436590436590436
                        RT_STRING0x249cc80x3b4dataTurkishTurkey0.4040084388185654
                        RT_STRING0x24a07c0x55edataUkrainianUkrain0.3369723435225619
                        RT_STRING0x24a5dc0x3dcdataSlovenianSlovenia0.39068825910931176
                        RT_STRING0x24a9b80x210dataChineseChina0.5170454545454546
                        RT_STRING0x24abc80x38edataEnglishGreat Britain0.3648351648351648
                        RT_STRING0x24af580x488dataSpanishMexico0.35
                        RT_STRING0x24b3e00x4b2dataPortuguesePortugal0.3319467554076539
                        RT_STRING0x24b8940x50adata0.3573643410852713
                        RT_STRING0x24bda00x44aAmigaOS bitmap font "D\0061\006,\006'\006!\006 ", fc_YSize 11776, 9990 elements, 2nd " ", 3rd "1\006J\006/\006 "ArabicSaudi Arabia0.3879781420765027
                        RT_STRING0x24c1ec0x238dataChineseTaiwan0.5598591549295775
                        RT_STRING0x24c4240x43edataCzechCzech Republic0.40423572744014735
                        RT_STRING0x24c8640x434dataDanishDenmark0.38104089219330856
                        RT_STRING0x24cc980x4e4dataGermanGermany0.3730031948881789
                        RT_STRING0x24d17c0x53cdataGreekGreece0.4052238805970149
                        RT_STRING0x24d6b80x416dataEnglishUnited States0.372848948374761
                        RT_STRING0x24dad00x488dataFinnishFinland0.36551724137931035
                        RT_STRING0x24df580x554dataFrenchFrance0.37976539589442815
                        RT_STRING0x24e4ac0x3e8dataHebrewIsrael0.419
                        RT_STRING0x24e8940x4dadataHungarianHungary0.39855072463768115
                        RT_STRING0x24ed700x4c4dataItalianItaly0.36311475409836064
                        RT_STRING0x24f2340x2f4dataJapaneseJapan0.5595238095238095
                        RT_STRING0x24f5280x2d8dataKoreanNorth Korea0.5892857142857143
                        RT_STRING0x24f5280x2d8dataKoreanSouth Korea0.5892857142857143
                        RT_STRING0x24f8000x49adataDutchNetherlands0.37436332767402375
                        RT_STRING0x24fc9c0x40edataNorwegianNorway0.38246628131021193
                        RT_STRING0x2500ac0x544dataPolishPoland0.37537091988130566
                        RT_STRING0x2505f00x4badataPortugueseBrazil0.39090909090909093
                        RT_STRING0x250aac0x4c8dataRussianRussia0.4027777777777778
                        RT_STRING0x250f740x498dataSlovakSlovakia0.4098639455782313
                        RT_STRING0x25140c0x470dataSwedishSweden0.37764084507042256
                        RT_STRING0x25187c0x41adataThaiThailand0.4180952380952381
                        RT_STRING0x251c980x510AmigaOS bitmap font "\374", fc_YSize 27904, 19456 elements, 2nd "4", 3rd "a"TurkishTurkey0.38503086419753085
                        RT_STRING0x2521a80x5c6dataUkrainianUkrain0.36400541271989173
                        RT_STRING0x2527700x4bcdataSlovenianSlovenia0.37293729372937295
                        RT_STRING0x252c2c0x23edataChineseChina0.5592334494773519
                        RT_STRING0x252e6c0x418dataEnglishGreat Britain0.37309160305343514
                        RT_STRING0x2532840x51adataSpanishMexico0.3460949464012251
                        RT_STRING0x2537a00x4b0dataPortuguesePortugal0.3641666666666667
                        RT_STRING0x253c500x144Matlab v4 mat-file (little endian) , numeric, rows 0, columns 00.38271604938271603
                        RT_STRING0x253d940x102dataArabicSaudi Arabia0.45348837209302323
                        RT_STRING0x253e980x76dataChineseTaiwan0.5847457627118644
                        RT_STRING0x253f100x10edataCzechCzech Republic0.4703703703703704
                        RT_STRING0x2540200x12adataDanishDenmark0.37583892617449666
                        RT_STRING0x25414c0x106dataGermanGermany0.40458015267175573
                        RT_STRING0x2542540xfadataGreekGreece0.484
                        RT_STRING0x2543500xf6dataEnglishUnited States0.42276422764227645
                        RT_STRING0x2544480xfadataFinnishFinland0.4
                        RT_STRING0x2545440x120Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0FrenchFrance0.4340277777777778
                        RT_STRING0x2546640xc6dataHebrewIsrael0.5202020202020202
                        RT_STRING0x25472c0x126dataHungarianHungary0.41836734693877553
                        RT_STRING0x2548540x10edataItalianItaly0.4222222222222222
                        RT_STRING0x2549640x82dataJapaneseJapan0.5846153846153846
                        RT_STRING0x2549e80x78dataKoreanNorth Korea0.5833333333333334
                        RT_STRING0x2549e80x78dataKoreanSouth Korea0.5833333333333334
                        RT_STRING0x254a600x114dataDutchNetherlands0.38405797101449274
                        RT_STRING0x254b740x12cdataNorwegianNorway0.36666666666666664
                        RT_STRING0x254ca00x12edataPolishPoland0.38741721854304634
                        RT_STRING0x254dd00x140Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0PortugueseBrazil0.384375
                        RT_STRING0x254f100x106dataRussianRussia0.44274809160305345
                        RT_STRING0x2550180x120dataSlovakSlovakia0.4513888888888889
                        RT_STRING0x2551380x12adataSwedishSweden0.3859060402684564
                        RT_STRING0x2552640x100dataThaiThailand0.41796875
                        RT_STRING0x2553640xf2dataTurkishTurkey0.4628099173553719
                        RT_STRING0x2554580x10cdataUkrainianUkrain0.4701492537313433
                        RT_STRING0x2555640x104dataSlovenianSlovenia0.4307692307692308
                        RT_STRING0x2556680x70dataChineseChina0.5535714285714286
                        RT_STRING0x2556d80xf6dataEnglishGreat Britain0.42276422764227645
                        RT_STRING0x2557d00x15eMatlab v4 mat-file (little endian) , numeric, rows 0, columns 0SpanishMexico0.4
                        RT_STRING0x2559300x12edataPortuguesePortugal0.37748344370860926
                        RT_MESSAGETABLE0x255a600x20Matlab v4 mat-file (little endian) %, text, rows 1, columns 1, imaginaryEnglishUnited States0.875
                        RT_GROUP_ICON0x255a800x5adataEnglishUnited States0.7666666666666667
                        RT_VERSION0x255adc0x360data0.44328703703703703
                        RT_VERSION0x255e3c0x360dataArabicSaudi Arabia0.4444444444444444
                        RT_VERSION0x25619c0x368dataChineseTaiwan0.44495412844036697
                        RT_VERSION0x2565040x360dataCzechCzech Republic0.44328703703703703
                        RT_VERSION0x2568640x360dataGermanGermany0.4444444444444444
                        RT_VERSION0x256bc40x360dataGreekGreece0.44560185185185186
                        RT_VERSION0x256f240x360dataEnglishUnited States0.4398148148148148
                        RT_VERSION0x2572840x360dataFinnishFinland0.44328703703703703
                        RT_VERSION0x2575e40x360dataFrenchFrance0.44328703703703703
                        RT_VERSION0x2579440x360dataHebrewIsrael0.44560185185185186
                        RT_VERSION0x257ca40x360dataHungarianHungary0.44560185185185186
                        RT_VERSION0x2580040x360dataItalianItaly0.4444444444444444
                        RT_VERSION0x2583640x360dataJapaneseJapan0.44560185185185186
                        RT_VERSION0x2586c40x360dataKoreanNorth Korea0.44675925925925924
                        RT_VERSION0x2586c40x360dataKoreanSouth Korea0.44675925925925924
                        RT_VERSION0x258a240x360dataDutchNetherlands0.44560185185185186
                        RT_VERSION0x258d840x360dataNorwegianNorway0.44328703703703703
                        RT_VERSION0x2590e40x360dataPolishPoland0.44560185185185186
                        RT_VERSION0x2594440x368dataPortugueseBrazil0.4426605504587156
                        RT_VERSION0x2597ac0x360dataRussianRussia0.44675925925925924
                        RT_VERSION0x259b0c0x360dataSlovakSlovakia0.44560185185185186
                        RT_VERSION0x259e6c0x360dataSwedishSweden0.44328703703703703
                        RT_VERSION0x25a1cc0x360dataThaiThailand0.44675925925925924
                        RT_VERSION0x25a52c0x360dataTurkishTurkey0.4444444444444444
                        RT_VERSION0x25a88c0x360dataUkrainianUkrain0.4479166666666667
                        RT_VERSION0x25abec0x360dataSlovenianSlovenia0.4444444444444444
                        RT_VERSION0x25af4c0x368dataChineseChina0.4461009174311927
                        RT_VERSION0x25b2b40x360dataEnglishGreat Britain0.44328703703703703
                        RT_VERSION0x25b6140x368dataSpanishMexico0.44380733944954126
                        RT_VERSION0x25b97c0x360dataPortuguesePortugal0.44560185185185186
                        RT_VXD0x25bcdc0xa47d4data0.8354637045304772
                        RT_MANIFEST0x3004b00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                        DLLImport
                        SHLWAPI.dllPathFileExistsW, SHDeleteKeyW, StrStrIW, StrStrW
                        KERNEL32.dllCreateFileW, GetFileSize, ReadFile, SetFilePointer, WriteFile, FormatMessageA, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetLocaleInfoEx, CompareStringEx, GetCPInfo, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, GetModuleHandleW, RtlCaptureContext, VirtualAlloc, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlPcToFileHeader, RaiseException, RtlUnwindEx, InterlockedPushEntrySList, InterlockedFlushSList, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetFileAttributesW, GetCommandLineA, GetLocalTime, ExitProcess, GetModuleHandleExW, SetFileAttributesW, HeapAlloc, GetStdHandle, GetFileType, GetTempPathW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, HeapReAlloc, SetConsoleCtrlHandler, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, GetFileSizeEx, SetFilePointerEx, SetStdHandle, ReadConsoleW, HeapSize, SetEndOfFile, WriteConsoleW, GetUserDefaultUILanguage, K32GetModuleFileNameExW, K32EnumProcessModules, GetModuleFileNameW, OpenProcess, OpenThread, GetCurrentProcessId, CloseHandle, GlobalAlloc, FreeResource, FindNextFileW, DeleteFileW, GetSystemDirectoryW, CreateProcessW, ResetEvent, SetEvent, MapViewOfFileEx, CreateFileMappingW, GetSystemInfo, UnmapViewOfFile, OpenFileMappingW, LocalAlloc, CreateEventW, ReleaseMutex, FormatMessageW, GetCurrentThreadId, InitializeCriticalSection, RtlUnwind, QueryFullProcessImageNameW, CreateMutexW, OutputDebugStringW, lstrcpyW, GetProcAddress, GetModuleHandleA, GetVersionExW, HeapFree, GlobalUnlock, GlobalLock, GlobalFree, VerSetConditionMask, LoadLibraryW, GetFullPathNameW, CreateProcessA, GetModuleFileNameA, VerifyVersionInfoW, WTSGetActiveConsoleSessionId, MulDiv, K32EnumProcesses, CopyFileW, lstrlenW, lstrcmpW, LocalFree, IsWow64Process, GetThreadPriority, SetThreadPriority, GetCurrentThread, GetCurrentProcess, WaitForSingleObject, GetTempFileNameW, FindFirstFileW, FindClose, GetLastError, GetTickCount, ExitThread, CreateThread, Sleep, MoveFileExW, GetSystemWindowsDirectoryW, GetCommandLineW, LoadLibraryExW, K32GetModuleBaseNameW
                        USER32.dllReleaseDC, GetDC, GetSysColor, DestroyIcon, SystemParametersInfoW, GetMessageW, TranslateMessage, DispatchMessageW, PeekMessageW, PostThreadMessageW, DefWindowProcW, RegisterClassW, UnregisterClassW, CreateWindowExW, DestroyWindow, SetLayeredWindowAttributes, IsWindowVisible, SetTimer, KillTimer, BeginPaint, EndPaint, ValidateRect, EnumWindows, LoadCursorW, DrawIconEx, UnionRect, DisplayConfigGetDeviceInfo, ChangeDisplaySettingsExW, EnumDisplayDevicesW, EnumDisplaySettingsW, EnumDisplaySettingsExW, MonitorFromPoint, GetMonitorInfoW, GetCursorPos, WindowFromPoint, GetDesktopWindow, CharUpperW, IntersectRect, EnumDisplayMonitors, PtInRect, OffsetRect, IsZoomed, SetWindowPlacement, CopyRect, GetWindowPlacement, SetWindowLongPtrW, MonitorFromRect, EqualRect, GetWindow, IsWindowEnabled, FindWindowExW, AllowSetForegroundWindow, SetForegroundWindow, GetForegroundWindow, InsertMenuItemW, InsertMenuW, IsIconic, SetWindowPos, ShowWindow, SendMessageTimeoutW, wsprintfW, GetWindowThreadProcessId, RegisterWindowMessageW, GetAncestor, GetParent, GetWindowLongPtrW, IsRectEmpty, GetClientRect, GetWindowTextW, GetClassNameW, GetSystemMetrics, GetAsyncKeyState, LoadImageW, LoadBitmapW, LoadStringW, CharLowerW, FindWindowW, MessageBoxW, IsWindow, PostMessageW, SendMessageW, FillRect, GetWindowRect, SetProcessDPIAware
                        SHELL32.dllSHGetSpecialFolderPathW, ShellExecuteW, ExtractIconExW, SHGetFileInfoW, SHGetFolderPathW, SHCreateDirectoryExW, CommandLineToArgvW, ExtractIconW
                        VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                        MSIMG32.dllTransparentBlt
                        GDI32.dllGetObjectW, SelectObject, GetDeviceCaps, DeleteDC, CreateCompatibleDC, CreateCompatibleBitmap, BitBlt, CreateSolidBrush, DeleteObject, CreateFontIndirectW, CreatePen, GetDIBits, GetStockObject, SetBkMode, StretchBlt, SetStretchBltMode, SetTextColor, BeginPath, EndPath, StrokeAndFillPath, TextOutW, SetBrushOrgEx
                        ADVAPI32.dllRegSetKeySecurity, SetSecurityDescriptorOwner, RegQueryValueExA, RegEnumValueW, RegEnumKeyW, RegDeleteValueW, CreateProcessAsUserW, SetSecurityDescriptorDacl, AllocateAndInitializeSid, SetEntriesInAclW, FreeSid, InitializeSecurityDescriptor, RegQueryInfoKeyW, RegDeleteKeyW, RegEnumKeyExW, ReportEventW, RegisterEventSourceW, SetSecurityDescriptorGroup, RevertToSelf, IsValidSecurityDescriptor, InitializeAcl, ImpersonateSelf, DeregisterEventSource, SetSecurityInfo, ConvertStringSecurityDescriptorToSecurityDescriptorW, GetSecurityDescriptorSacl, RegCopyTreeW, RegSetValueExW, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExW, RegOpenCurrentUser, RegCloseKey, OpenProcessToken, OpenThreadToken, AccessCheck, AddAccessAllowedAce, CheckTokenMembership, CreateWellKnownSid, DuplicateTokenEx, GetLengthSid, GetTokenInformation, RegGetValueW
                        ole32.dllStringFromGUID2, CLSIDFromString, CoCreateInstance, CoInitialize, CreateStreamOnHGlobal
                        OLEAUT32.dllOleLoadPicture
                        NameOrdinalAddress
                        DMAddNewDesktop4160x18008c760
                        DMEnumDesktopInfos4040x18008c790
                        DMEnumDesktops4030x18008c7b0
                        DMGetCurrentDesktop4070x18008ca20
                        DMGetDefaultDesktop4090x18008caa0
                        DMGetDesktopCount4100x18008cac0
                        DMGetDesktopInfo4140x18008cad0
                        DMGetDesktopMask4130x18008cb40
                        DMGetGrids4200x18008cb60
                        DMGetPerMonWallpapers4110x18008cbd0
                        DMGetSetting4000x18008cc20
                        DMMoveToDesktop4170x18008cc80
                        DMRemoveDesktop4060x18008cd20
                        DMSetCurrentDesktop4080x18008cd50
                        DMSetDesktopInfo4150x18008cda0
                        DMSetGrids4190x18008ce20
                        DMSetPerMonWallpapers4120x18008ceb0
                        DMSetSetting4010x18008cf30
                        DMStoreSettings4020x18008cfe0
                        GetNViewCAPS8140x18008d010
                        HKAdd5060x18008d040
                        HKEnable5090x18008d0e0
                        HKEnumActions5040x18008d130
                        HKEnumCommands5000x18008d180
                        HKGetAction5080x18008d270
                        HKIsValidBin5100x18008d2b0
                        HKRemove5030x18008d330
                        HKSetParams5130x18008d3e0
                        NVCreateNViewMainProc2060x18008d460
                        NVDesktopSystray2290x18008d770
                        NVDisable2050x18008d910
                        NVEnable2040x18008da00
                        NVGetAppAndClassFromHwnd2250x18008dad0
                        NVGetDisplayRects2160x18008db00
                        NVGetGridSetting2610x18008db60
                        NVGetLastError2090x18008dba0
                        NVGetMonitorNames8170x18008dbb0
                        NVGetNViewExecutablePath2170x18008dbc0
                        NVGetNumDisplays2150x18008dbd0
                        NVGetNviewRootKey2300x18008dbe0
                        NVGetPseudoMaxState2180x18008dbf0
                        NVGetSystemInfo8180x18008dc50
                        NVGetWindowRectViaNviewProc2330x18008e340
                        NVIsHookEnabled2030x18008e430
                        NVLaunchSysMenu2320x18008e440
                        NVMaxToDesktop2240x18008e480
                        NVMaxToDisplay2230x18008e4a0
                        NVMaxToGrid2210x18008e4c0
                        NVMaxToOverlapGrid2220x18008e4e0
                        NVMaxToRect2190x18008e500
                        NVNotifyClientWindows2140x18008e540
                        NVOpenNViewRegKey2120x18008e550
                        NVQueryDesktopContextMenu2260x18008e590
                        NVQueryDesktopContextMenuEx2270x18008e5b0
                        NVRegisterNotificationWindow2070x18008e710
                        NVRestore2200x18008e730
                        NVRunControlPanel2020x18008e750
                        NVSaveGridsToReg2630x18008ec00
                        NVSetForegroundWindow2280x18008ec30
                        NVSetGridSetting2620x18008ec50
                        NVSetLastError2100x18008ecd0
                        NVSetWindowPosViaNviewProc2340x18008ece0
                        NVShowMonGridIDOverlay2130x18008ed20
                        NVUnregisterNotificationWindow2080x18008ed60
                        NVVirtualDisplayEDID2010x18008ed80
                        NVWaitForNViewMain2920x18008edc0
                        NVWaitForNViewMainExit2930x18008edd0
                        NViewGlobalSetting2510x18008ede0
                        NViewUserInterfaceSetting2520x18008ee30
                        PMDelete6070x18008eec0
                        PMEnum6050x18008ef90
                        PMFindProfile2860x18008f180
                        PMGetCurrentProfile6080x18008f190
                        PMGetProfileDirectory2850x18008f290
                        PMGetProfileInfo2870x18008f2a0
                        PMGetProfileInfoEx2880x18008f3c0
                        PMGetStartupProfile6090x18008f410
                        PMImport6060x18008f4a0
                        PMLoad6010x18008f4b0
                        PMLoadApp6030x18008f4c0
                        PMLoadEx6020x18008f5e0
                        PMLock6110x18008f7a0
                        PMSave6040x18008f7b0
                        PMSetStartupProfile6100x18008f900
                        PMUpdate2890x18008fa80
                        WMParseSetting3070x18008fbc0
                        WMSetSettingHWND3030x18008fbf0
                        nViewCmd1040x1800844e0
                        nViewLoadHook1020x180084b90
                        nViewUninstallNotify1060x180084bb0
                        nViewUnload1030x180084bd0
                        nviewExecute9000x180095620
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        ArabicSaudi Arabia
                        ChineseTaiwan
                        CzechCzech Republic
                        DanishDenmark
                        GermanGermany
                        GreekGreece
                        FinnishFinland
                        FrenchFrance
                        HebrewIsrael
                        HungarianHungary
                        ItalianItaly
                        JapaneseJapan
                        KoreanNorth Korea
                        KoreanSouth Korea
                        DutchNetherlands
                        NorwegianNorway
                        PolishPoland
                        PortugueseBrazil
                        RussianRussia
                        SlovakSlovakia
                        SwedishSweden
                        ThaiThailand
                        TurkishTurkey
                        UkrainianUkrain
                        SlovenianSlovenia
                        ChineseChina
                        EnglishGreat Britain
                        SpanishMexico
                        PortuguesePortugal
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 17, 2024 09:29:26.093257904 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:26.213037968 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:26.213332891 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:26.268338919 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:26.388097048 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:27.464823961 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:27.464848042 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:27.464863062 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:27.464894056 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:27.465090036 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:27.656363010 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:27.656438112 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:27.679482937 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:27.799292088 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:28.076164961 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:28.076251030 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:28.084718943 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:28.204504967 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:35.554508924 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:35.554600954 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:35.555605888 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:35.675329924 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:35.675437927 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:35.675837994 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:35.795747042 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:36.916445971 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:36.916520119 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:36.917422056 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:36.918725967 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:37.037461996 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:37.038623095 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.513968945 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.514110088 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.514168978 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.514205933 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.514250040 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.514273882 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.516325951 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.516382933 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.516525984 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.516561985 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.516582012 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.516618013 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.516623020 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.516652107 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.516674042 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.516688108 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.516701937 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.516743898 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.524720907 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.524792910 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.524799109 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.524857998 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.634327888 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.634382010 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.634407997 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.634437084 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.705977917 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.706038952 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.706095934 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.706144094 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.710159063 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.710215092 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.710268974 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.718446016 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.719105005 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.721456051 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.721512079 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.721584082 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.721631050 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.729764938 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.729823112 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.729851007 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.729873896 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.738190889 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.738229036 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.738255978 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.738272905 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.746429920 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.746490002 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.746548891 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.746608019 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.754741907 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.754849911 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.754899025 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.755150080 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.763190031 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.763226032 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.763284922 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.763284922 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.771377087 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.771487951 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.771605015 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.778471947 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.778613091 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.779007912 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.785444975 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.785504103 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.785778999 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.792604923 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.793551922 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.898173094 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.898211002 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.898437977 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.898437977 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.900693893 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.900762081 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.900773048 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.900829077 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.908133030 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.908168077 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.908194065 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.908221006 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.911765099 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.911840916 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.911930084 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.911983967 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.915848017 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.915905952 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.916017056 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.916073084 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.920523882 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.920581102 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.920727015 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.920780897 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.924988985 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.925060987 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.925154924 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.925206900 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.929596901 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.929656982 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.929759979 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.929811001 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.934284925 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.934340954 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.934458017 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.934513092 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.938908100 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.938985109 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.939086914 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.939138889 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.943671942 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.943707943 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.943730116 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.943759918 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.947839975 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.947899103 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.947978020 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.948034048 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.952827930 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.952866077 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.952904940 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.952933073 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.957271099 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.957324982 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.957423925 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.957478046 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.962024927 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.962059975 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.962116003 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.966711998 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.966747046 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.966777086 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.966794014 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.971138954 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.971220016 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.971303940 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.971364975 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.975806952 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.975857019 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.975893974 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.975915909 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.980523109 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.980560064 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:44.980585098 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:44.980611086 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.090627909 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.090667009 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.090743065 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.092737913 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.092930079 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.093025923 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.096187115 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.096223116 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.096298933 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.100016117 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.100204945 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.100285053 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.103629112 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.103967905 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.104034901 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.107161999 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.107230902 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.107310057 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.110608101 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.110677004 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.110743046 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.110804081 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.114933968 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.114969969 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.115031004 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.117676973 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.117712021 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.117782116 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.120985031 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.121290922 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.121366978 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.124618053 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.124789953 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.124859095 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.128010988 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.128165007 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.128254890 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.131573915 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.131608963 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.131686926 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.134783983 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.134860039 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.134969950 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.135023117 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.138278961 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.138402939 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.138485909 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.141701937 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.141829014 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.141904116 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.145163059 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.145275116 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.145343065 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.148611069 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.148737907 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.148796082 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.152079105 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.152266026 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.152328014 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.155571938 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.155688047 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.155786991 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.158987999 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.159041882 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.159105062 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.159173965 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.162456989 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.162589073 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.162641048 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.165970087 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.166039944 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.166095018 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.169575930 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.169653893 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.169714928 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.172907114 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.173015118 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.173078060 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.176286936 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.176419973 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.176495075 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.179740906 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.179877996 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.179949045 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.183228970 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.183366060 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.183434010 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.186692953 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.186754942 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.186870098 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.186935902 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.190107107 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.190171003 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.190236092 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.190289021 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.193588972 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.193691015 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.193747044 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.197099924 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.197154045 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.197248936 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.200479031 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.200702906 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.200767040 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.204010963 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.204045057 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.204112053 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.282450914 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.282531023 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.282532930 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.282582998 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.283900976 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.283950090 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.284015894 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.284063101 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.286926985 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.286981106 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.287033081 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.287085056 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.289880037 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.289927959 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.289994001 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.290040970 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.292805910 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.292898893 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.292937040 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.292984962 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.295644045 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.295691013 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.295758009 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.295804024 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.298409939 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.298495054 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.298544884 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.298595905 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.301052094 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.301099062 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.301179886 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.301228046 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.303752899 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.303818941 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.303879976 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.303925991 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.306442022 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.306519032 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.306561947 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.306611061 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.309185982 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.309238911 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.309245110 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.309286118 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.311633110 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.311670065 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.311691999 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.311713934 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.314059973 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.314107895 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:29:45.314157963 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:29:45.314203024 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:30:26.034138918 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:30:26.154160976 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:26.157116890 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:30:26.169045925 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:30:26.288912058 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:27.468528986 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:27.468552113 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:27.468563080 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:27.468635082 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:30:27.468635082 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:30:27.480200052 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:30:27.600712061 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:27.906507969 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:27.907455921 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:30:27.908061028 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:30:28.027832985 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:35.111414909 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:30:35.111653090 CET498708817192.168.2.594.232.46.11
                        Dec 17, 2024 09:31:08.802402973 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:31:08.802484035 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:31:15.182535887 CET499808817192.168.2.594.232.46.11
                        Dec 17, 2024 09:31:15.302443981 CET88174998094.232.46.11192.168.2.5
                        Dec 17, 2024 09:31:15.302562952 CET499808817192.168.2.594.232.46.11
                        Dec 17, 2024 09:31:15.302946091 CET499808817192.168.2.594.232.46.11
                        Dec 17, 2024 09:31:15.422894955 CET88174998094.232.46.11192.168.2.5
                        Dec 17, 2024 09:31:15.642292976 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:31:15.642461061 CET497138817192.168.2.594.232.40.41
                        Dec 17, 2024 09:31:15.762352943 CET88174971394.232.40.41192.168.2.5
                        Dec 17, 2024 09:31:15.762617111 CET88174974194.232.40.41192.168.2.5
                        Dec 17, 2024 09:31:15.762671947 CET497418817192.168.2.594.232.40.41
                        Dec 17, 2024 09:31:47.345194101 CET499808817192.168.2.594.232.46.11
                        Dec 17, 2024 09:32:05.979008913 CET88174987094.232.46.11192.168.2.5
                        Dec 17, 2024 09:32:05.979104042 CET498708817192.168.2.594.232.46.11
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 17, 2024 09:29:25.681121111 CET5985353192.168.2.51.1.1.1
                        Dec 17, 2024 09:29:26.088426113 CET53598531.1.1.1192.168.2.5
                        Dec 17, 2024 09:29:40.409395933 CET5170653192.168.2.51.1.1.1
                        Dec 17, 2024 09:29:40.806226969 CET53517061.1.1.1192.168.2.5
                        Dec 17, 2024 09:30:25.613301039 CET6511853192.168.2.51.1.1.1
                        Dec 17, 2024 09:30:26.029474974 CET53651181.1.1.1192.168.2.5
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 17, 2024 09:29:25.681121111 CET192.168.2.51.1.1.10x6183Standard query (0)cronoze.comA (IP address)IN (0x0001)false
                        Dec 17, 2024 09:29:40.409395933 CET192.168.2.51.1.1.10xf066Standard query (0)cronoze.comA (IP address)IN (0x0001)false
                        Dec 17, 2024 09:30:25.613301039 CET192.168.2.51.1.1.10x7618Standard query (0)muuxxu.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 17, 2024 09:29:26.088426113 CET1.1.1.1192.168.2.50x6183No error (0)cronoze.com94.232.40.41A (IP address)IN (0x0001)false
                        Dec 17, 2024 09:29:40.806226969 CET1.1.1.1192.168.2.50xf066No error (0)cronoze.com94.232.40.41A (IP address)IN (0x0001)false
                        Dec 17, 2024 09:30:26.029474974 CET1.1.1.1192.168.2.50x7618No error (0)muuxxu.com94.232.46.11A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:03:29:05
                        Start date:17/12/2024
                        Path:C:\Windows\System32\loaddll64.exe
                        Wow64 process (32bit):false
                        Commandline:loaddll64.exe "C:\Users\user\Desktop\TiNgny4xSB.dll"
                        Imagebase:0x7ff67e660000
                        File size:165'888 bytes
                        MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:1
                        Start time:03:29:05
                        Start date:17/12/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6d64d0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:2
                        Start time:03:29:05
                        Start date:17/12/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1
                        Imagebase:0x7ff62cd80000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:03:29:05
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktop
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:03:29:05
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:03:29:06
                        Start date:17/12/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 2836 -s 464
                        Imagebase:0x7ff6f76c0000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:03:29:08
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopInfos
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:12
                        Start time:03:29:09
                        Start date:17/12/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 6408 -s 488
                        Imagebase:0x7ff6f76c0000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:13
                        Start time:03:29:11
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktops
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:15
                        Start time:03:29:12
                        Start date:17/12/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 4768 -s 488
                        Imagebase:0x7ff6f76c0000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:16
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMAddNewDesktop
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:17
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopInfos
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:18
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktops
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:19
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nviewExecute
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:20
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUnload
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:21
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUninstallNotify
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:22
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewLoadHook
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:23
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewCmd
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000017.00000002.3985806152.000001CE5002C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000017.00000002.3985806152.000001CE500D4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000017.00000002.4024711141.000001CE50158000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        Has exited:false

                        Target ID:24
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMSetSettingHWND
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:25
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMParseSetting
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:26
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMUpdate
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:27
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSetStartupProfile
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:28
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSave
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:29
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLock
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:30
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadEx
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:31
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadApp
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:32
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoad
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:33
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMImport
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:34
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetStartupProfile
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:35
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoEx
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:36
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfo
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:37
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileDirectory
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:38
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetCurrentProfile
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:39
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMFindProfile
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:40
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMEnum
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:41
                        Start time:03:29:15
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMDelete
                        Imagebase:0x7ff690df0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.2%
                          Dynamic/Decrypted Code Coverage:99.2%
                          Signature Coverage:17.9%
                          Total number of Nodes:262
                          Total number of Limit Nodes:8
                          execution_graph 94844 180037788 94845 1800377aa __crtGetStringTypeA_stat 94844->94845 94846 180037806 94845->94846 94847 1800377e6 94845->94847 94879 1800377da 94845->94879 94848 180037854 94846->94848 94851 180037849 94846->94851 94902 18002f26c 63 API calls _getptd_noexit 94847->94902 94852 180037869 94848->94852 94906 180037538 65 API calls 3 library calls 94848->94906 94905 18002f26c 63 API calls _getptd_noexit 94851->94905 94894 18003ec20 94852->94894 94857 1800377eb 94903 18002f2dc 63 API calls _getptd_noexit 94857->94903 94860 1800377f3 94904 180035cb8 12 API calls _invalid_parameter_noinfo 94860->94904 94862 180037ebe WriteFile 94864 180037ee8 GetLastError 94862->94864 94865 180037edd 94862->94865 94886 180037b34 94864->94886 94865->94864 94866 180037899 GetConsoleMode 94867 1800378d9 94866->94867 94866->94886 94869 1800378e8 GetConsoleCP 94867->94869 94867->94886 94868 180037f0d 94868->94879 94912 18002f2dc 63 API calls _getptd_noexit 94868->94912 94869->94868 94892 18003790c _fgetwc_nolock 94869->94892 94871 180037c37 WriteFile 94873 180037b5f GetLastError 94871->94873 94871->94886 94872 180037f39 94913 18002f26c 63 API calls _getptd_noexit 94872->94913 94873->94886 94875 180037dfa WideCharToMultiByte 94880 180037e46 WriteFile 94875->94880 94881 180037b69 GetLastError 94875->94881 94876 180037d24 WriteFile 94876->94873 94887 180037cd6 94876->94887 94878 180037f06 94911 18002f28c 63 API calls 2 library calls 94878->94911 94914 18002cc10 94879->94914 94884 180037e93 GetLastError 94880->94884 94880->94887 94881->94886 94884->94887 94885 18003ff78 WriteConsoleW CreateFileW _write_nolock 94891 180037a3c 94885->94891 94886->94862 94886->94868 94886->94871 94886->94875 94886->94876 94886->94878 94886->94879 94909 18002f2dc 63 API calls _getptd_noexit 94886->94909 94910 18002f26c 63 API calls _getptd_noexit 94886->94910 94887->94880 94887->94886 94888 1800379be WideCharToMultiByte 94888->94886 94890 180037a01 WriteFile 94888->94890 94890->94881 94890->94891 94891->94881 94891->94885 94891->94886 94891->94892 94893 180037a5c WriteFile 94891->94893 94892->94886 94892->94888 94892->94891 94908 180038ddc 63 API calls _LocaleUpdate::_LocaleUpdate 94892->94908 94893->94873 94893->94891 94895 18003ec36 94894->94895 94896 18003ec29 94894->94896 94899 180037870 94895->94899 94924 18002f2dc 63 API calls _getptd_noexit 94895->94924 94923 18002f2dc 63 API calls _getptd_noexit 94896->94923 94899->94886 94907 1800389f4 63 API calls 2 library calls 94899->94907 94900 18003ec6d 94925 180035cb8 12 API calls _invalid_parameter_noinfo 94900->94925 94902->94857 94903->94860 94904->94879 94905->94857 94906->94852 94907->94866 94908->94892 94909->94886 94910->94886 94911->94868 94912->94872 94913->94879 94915 18002cc19 94914->94915 94916 18002cc24 94915->94916 94917 1800357c8 IsProcessorFeaturePresent 94915->94917 94918 1800357df 94917->94918 94926 180032858 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 94918->94926 94920 1800357f2 94927 18003577c SetUnhandledExceptionFilter UnhandledExceptionFilter IsDebuggerPresent _call_reportfault 94920->94927 94923->94899 94924->94900 94925->94899 94926->94920 94928 18002da78 94929 18002db0c 94928->94929 94941 18002da90 94928->94941 94951 180036dc0 DecodePointer 94929->94951 94931 18002db11 94952 18002f2dc 63 API calls _getptd_noexit 94931->94952 94932 18002dac8 HeapAlloc 94935 18002db01 94932->94935 94932->94941 94936 18002daf1 94949 18002f2dc 63 API calls _getptd_noexit 94936->94949 94940 18002daa8 94940->94932 94945 180036dfc 63 API calls 2 library calls 94940->94945 94946 180036e70 63 API calls 6 library calls 94940->94946 94947 180036898 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 94940->94947 94941->94932 94941->94936 94941->94940 94942 18002daf6 94941->94942 94948 180036dc0 DecodePointer 94941->94948 94950 18002f2dc 63 API calls _getptd_noexit 94942->94950 94945->94940 94946->94940 94948->94941 94949->94942 94950->94935 94951->94931 94952->94935 94953 7ff8a8cf9790 VirtualAlloc 94954 7ff8a8d05b5d 94953->94954 94955 1be22ac0009 94958 1be22ac0030 94955->94958 94959 1be22ac004b 94958->94959 94962 1be22ac00f0 94959->94962 94961 1be22ac001d 94963 1be22ac0110 94962->94963 94965 1be22ac0124 94962->94965 94963->94965 94966 1be22ac0b00 94963->94966 94965->94961 94967 1be22ac0b36 94966->94967 94971 1be22ac0b1c 94966->94971 94967->94965 94968 1be22ac0c3c VirtualAlloc 94969 1be22ac0c6f 94968->94969 94970 1be22ac0cb1 VirtualAlloc 94968->94970 94969->94967 94969->94970 94970->94967 94972 1be22ac0cf3 94970->94972 94971->94967 94971->94968 94972->94967 94973 1be22ac0e97 VirtualAlloc 94972->94973 94973->94967 94974 1800354ac 94975 1800354d3 GetLocaleInfoEx 94974->94975 94976 1800354d7 __crtDownlevelLocaleNameToLCID 94974->94976 94977 1800354ec 94975->94977 94978 1800354dc GetLocaleInfoW 94976->94978 94978->94977 94979 18002f10c 94980 18002f128 94979->94980 94982 18002f12d 94979->94982 94993 180039844 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 94980->94993 94983 18002f1b8 94982->94983 94990 18002f182 94982->94990 94994 18002efac 94982->94994 94983->94990 95042 1800026a0 94983->95042 94987 18002f1ff 94988 18002efac _CRT_INIT 107 API calls 94987->94988 94987->94990 94988->94990 94989 1800026a0 _DllMainCRTStartup 180 API calls 94991 18002f1f2 94989->94991 94992 18002efac _CRT_INIT 107 API calls 94991->94992 94992->94987 94993->94982 94995 18002f03b 94994->94995 94996 18002efbe 94994->94996 94998 18002f091 94995->94998 95007 18002f03f _CRT_INIT 94995->95007 95046 180036780 GetProcessHeap 94996->95046 95000 18002f0f4 94998->95000 95001 18002f096 94998->95001 94999 18002efc3 95010 18002efc7 _CRT_INIT 94999->95010 95047 180038b60 68 API calls 7 library calls 94999->95047 95000->95010 95077 1800389b8 63 API calls 2 library calls 95000->95077 95076 180032904 TlsGetValue 95001->95076 95007->95010 95072 1800368b0 65 API calls free 95007->95072 95008 18002f067 95020 18002f076 _CRT_INIT 95008->95020 95073 18003670c 64 API calls free 95008->95073 95009 18002efd3 _RTC_Initialize 95009->95010 95015 18002efe3 GetCommandLineA 95009->95015 95010->94983 95014 18002f071 95074 180038be0 TlsFree _mtterm 95014->95074 95048 1800398f0 68 API calls 2 library calls 95015->95048 95020->95010 95075 180038be0 TlsFree _mtterm 95020->95075 95021 18002eff5 95049 1800363dc 95021->95049 95026 18002f001 95029 18002f005 95026->95029 95030 18002f00c 95026->95030 95067 180038be0 TlsFree _mtterm 95029->95067 95068 180039454 76 API calls 3 library calls 95030->95068 95034 18002f011 95035 18002f025 95034->95035 95069 180039710 75 API calls 5 library calls 95034->95069 95041 18002f029 95035->95041 95071 18003670c 64 API calls free 95035->95071 95038 18002f01a 95038->95035 95070 180036a30 74 API calls 5 library calls 95038->95070 95039 18002f039 95039->95029 95041->95010 95043 1800026b4 95042->95043 95044 1800026a8 95042->95044 95043->94987 95043->94989 95116 1800026c0 95044->95116 95046->94999 95047->95009 95048->95021 95078 1800301c0 95049->95078 95051 18003640b 95052 180031ae8 _calloc_crt 63 API calls 95051->95052 95053 18003641f 95052->95053 95054 18003649a GetStartupInfoW 95053->95054 95055 18003642f _wfsopen 95053->95055 95056 1800364b4 95054->95056 95062 1800365f6 95054->95062 95055->95026 95060 180031ae8 _calloc_crt 63 API calls 95056->95060 95056->95062 95063 180036510 95056->95063 95057 1800366db 95058 1800303b0 _fcloseall LeaveCriticalSection 95057->95058 95058->95055 95059 18003663e GetStdHandle 95061 180036669 GetFileType 95059->95061 95059->95062 95060->95056 95061->95062 95062->95057 95062->95059 95065 18003293c _ioinit InitializeCriticalSectionAndSpinCount 95062->95065 95063->95062 95064 180036598 GetFileType 95063->95064 95066 18003293c _ioinit InitializeCriticalSectionAndSpinCount 95063->95066 95064->95063 95065->95062 95066->95063 95068->95034 95069->95038 95070->95035 95071->95039 95072->95008 95073->95014 95077->95010 95079 1800301ef EnterCriticalSection 95078->95079 95080 1800301de 95078->95080 95084 18003028c 95080->95084 95085 1800302c2 95084->95085 95086 1800302a9 95084->95086 95087 1800301e3 95085->95087 95088 1800302da 95085->95088 95109 180036dfc 63 API calls 2 library calls 95086->95109 95087->95079 95108 1800369f8 63 API calls 3 library calls 95087->95108 95112 180031b68 63 API calls malloc 95088->95112 95091 1800302ae 95110 180036e70 63 API calls 6 library calls 95091->95110 95092 1800302e4 95094 1800302ec 95092->95094 95095 1800302fb 95092->95095 95113 18002f2dc 63 API calls _getptd_noexit 95094->95113 95098 1800301c0 _lock 62 API calls 95095->95098 95096 1800302b8 95111 180036898 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 95096->95111 95101 180030305 95098->95101 95100 1800302f1 95100->95087 95102 180030323 95101->95102 95103 180030310 95101->95103 95115 18002d5f4 63 API calls 2 library calls 95102->95115 95114 18003293c InitializeCriticalSectionAndSpinCount 95103->95114 95106 18003031d LeaveCriticalSection 95106->95087 95109->95091 95110->95096 95112->95092 95113->95100 95114->95106 95115->95106 95168 180002cb0 GetModuleFileNameW 95116->95168 95118 180002709 __crtGetStringTypeA_stat 95119 18000275b 6 API calls 95118->95119 95178 180005f70 95119->95178 95123 180002843 95186 180005250 161 API calls 2 library calls 95123->95186 95125 180002855 95126 18000287f 95125->95126 95187 1800023f0 65 API calls 2 library calls 95125->95187 95127 180002ac1 95126->95127 95188 180006a80 65 API calls 2 library calls 95126->95188 95204 180005360 90 API calls 2 library calls 95127->95204 95131 180002895 95189 180003260 111 API calls 4 library calls 95131->95189 95133 180002af6 95206 1800038d0 90 API calls _RunAllParam 95133->95206 95134 180002acb 95134->95133 95205 1800023f0 65 API calls 2 library calls 95134->95205 95135 1800028a5 95190 180006db0 99 API calls 3 library calls 95135->95190 95139 1800028bd 95191 180006db0 99 API calls 3 library calls 95139->95191 95140 180002b22 std::ios_base::_Ios_base_dtor 95141 18002cc10 __crtGetStringTypeA_stat 7 API calls 95140->95141 95143 180002b7a 95141->95143 95143->95043 95144 1800028e2 95192 1800062f0 65 API calls 2 library calls 95144->95192 95146 18000292b 95193 180003260 111 API calls 4 library calls 95146->95193 95148 180002939 95194 180006db0 99 API calls 3 library calls 95148->95194 95150 180002951 95195 180006db0 99 API calls 3 library calls 95150->95195 95152 180002999 95196 1800062f0 65 API calls 2 library calls 95152->95196 95154 1800029bf 95197 180003260 111 API calls 4 library calls 95154->95197 95156 1800029cd 95198 180006db0 99 API calls 3 library calls 95156->95198 95158 1800029e5 95199 180006db0 99 API calls 3 library calls 95158->95199 95160 180002a2d 95200 1800062f0 65 API calls 2 library calls 95160->95200 95162 180002a53 95201 180003260 111 API calls 4 library calls 95162->95201 95164 180002a61 95202 180006db0 99 API calls 3 library calls 95164->95202 95166 180002a79 95203 180006db0 99 API calls 3 library calls 95166->95203 95169 180002d06 95168->95169 95170 180002d2e 95168->95170 95207 1800062f0 65 API calls 2 library calls 95169->95207 95208 1800062f0 65 API calls 2 library calls 95170->95208 95173 18002cc10 __crtGetStringTypeA_stat 7 API calls 95174 180002e8a 95173->95174 95174->95118 95175 180002d29 _cftoe2_l 95175->95173 95176 180002d79 _DllMainCRTStartup 95176->95175 95209 180003890 65 API calls messages 95176->95209 95210 180002510 70 API calls 3 library calls 95178->95210 95180 180005f8f _DllMainCRTStartup 95211 180006940 99 API calls 6 library calls 95180->95211 95182 180005fb1 95183 180002810 95182->95183 95212 1800023f0 65 API calls 2 library calls 95182->95212 95185 1800051b0 70 API calls _DllMainCRTStartup 95183->95185 95185->95123 95186->95125 95187->95126 95188->95131 95189->95135 95190->95139 95191->95144 95192->95146 95193->95148 95194->95150 95195->95152 95196->95154 95197->95156 95198->95158 95199->95160 95200->95162 95201->95164 95202->95166 95203->95127 95204->95134 95205->95133 95206->95140 95207->95175 95208->95176 95209->95175 95210->95180 95211->95182 95212->95183

                          Control-flow Graph

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID: +=$,=
                          • API String ID: 0-3116756818
                          • Opcode ID: 86d877f4bfbdb9dbd774ef72c11f05b79659dfa0d66e50673e85384098f5fb92
                          • Instruction ID: acb6f7df432d5fcb9b2e5b2f976a5c0b3d7abe5458858ec1da86c0f1015eeb34
                          • Opcode Fuzzy Hash: 86d877f4bfbdb9dbd774ef72c11f05b79659dfa0d66e50673e85384098f5fb92
                          • Instruction Fuzzy Hash: 2C242B52F7569C06EE59C1720AA17FA40C65FB6BE9F64F73AFC0A26BE0D91E54834080

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 9 7ff8a8cf9790-7ff8a8d05b56 VirtualAlloc 10 7ff8a8d05b5d-7ff8a8d05c04 9->10 10->10 11 7ff8a8d05c0a-7ff8a8d07afd 10->11
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: cf5cb5571d315598206a8790c9a41924e950f52808e5ddc8a3697dcb9696509b
                          • Instruction ID: 960af1ca1c1bf06985261ab048f7e0cdebaa160ec48eadada320f9449f15efae
                          • Opcode Fuzzy Hash: cf5cb5571d315598206a8790c9a41924e950f52808e5ddc8a3697dcb9696509b
                          • Instruction Fuzzy Hash: EF142B52F7569C06EE59C1720AA17FA80C65FB67E9F64F73AFC0A26BE0DD1E54834080

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 12 1800026c0-18000280b call 180002cb0 call 18002f4a0 * 3 GetModuleFileNameW SHGetSpecialFolderPathW lstrcatW * 4 call 180005f70 22 180002810-180002858 call 1800051b0 call 180005250 12->22 27 18000285a-180002872 22->27 28 180002880-180002885 22->28 29 180002874 27->29 30 180002877-18000287f call 1800023f0 27->30 31 180002ac1-180002ace call 180005360 28->31 32 18000288b-1800028ab call 180006a80 call 180003260 28->32 29->30 30->28 40 180002af7-180002b5d call 1800038d0 call 180007928 31->40 41 180002ad0-180002ae9 31->41 46 1800028ad 32->46 47 1800028b0-1800028c6 call 180006db0 32->47 57 180002b6b-180002b92 call 18002cc10 40->57 58 180002b5f-180002b66 call 18002e8fc 40->58 43 180002aeb 41->43 44 180002aee-180002af6 call 1800023f0 41->44 43->44 44->40 46->47 55 1800028d1-1800028fa call 180006db0 47->55 56 1800028c8-1800028cc call 18002e8fc 47->56 65 180002901-18000290c 55->65 66 1800028fc-1800028ff 55->66 56->55 58->57 68 180002910-180002919 65->68 67 18000291b-18000293f call 1800062f0 call 180003260 66->67 73 180002941 67->73 74 180002944-18000295a call 180006db0 67->74 68->67 68->68 73->74 77 180002965-18000297d 74->77 78 18000295c-180002960 call 18002e8fc 74->78 80 180002988-1800029d3 call 180006db0 call 1800062f0 call 180003260 77->80 81 18000297f-180002983 call 18002e8fc 77->81 78->77 89 1800029d5 80->89 90 1800029d8-1800029ee call 180006db0 80->90 81->80 89->90 93 1800029f9-180002a11 90->93 94 1800029f0-1800029f4 call 18002e8fc 90->94 96 180002a13-180002a17 call 18002e8fc 93->96 97 180002a1c-180002a67 call 180006db0 call 1800062f0 call 180003260 93->97 94->93 96->97 105 180002a69 97->105 106 180002a6c-180002a82 call 180006db0 97->106 105->106 109 180002a84-180002a88 call 18002e8fc 106->109 110 180002a8d-180002aa5 106->110 109->110 112 180002aa7-180002aab call 18002e8fc 110->112 113 180002ab0-180002abc call 180006db0 110->113 112->113 113->31
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3962680359.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3961838200.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3963326076.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3963860216.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3966377316.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: lstrcat$FileModuleName$FolderIos_base_dtorPathSpecialstd::ios_base::_
                          • String ID: \NTUSER.DAT.Not$nViewCmd
                          • API String ID: 2606783807-1926657965
                          • Opcode ID: a946bae1627097ab7b73f61163b0859f0a6ae39e4bd01eb7db3eba8b1cf675f5
                          • Instruction ID: 3dd1c745be193ef327f8b6b82ef9b9860cbb876b441ce7f55bb8257e988bbc7a
                          • Opcode Fuzzy Hash: a946bae1627097ab7b73f61163b0859f0a6ae39e4bd01eb7db3eba8b1cf675f5
                          • Instruction Fuzzy Hash: 7FE15B32224B8989EBA1DF24D8943DD3761FB897C8F809126F64E47AA9DF74C64DC740

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3973657442.000001BE22AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001BE22AC0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1be22ac0000_loaddll64.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 7479d515978b8398c8f18a7fbb8c6ce0b9f2a044b6e8d29228c90f9ede51720f
                          • Instruction ID: 870db38b58d73a260d56fdb85a5f1fc71860040559d9caadb9b99500eebcbb7d
                          • Opcode Fuzzy Hash: 7479d515978b8398c8f18a7fbb8c6ce0b9f2a044b6e8d29228c90f9ede51720f
                          • Instruction Fuzzy Hash: 48E11E70218B489FE794EF18C099BAAB7E0FB9C359F50495EF489C7661D774D881CB02

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 689 7ff8a8cb44e5-7ff8a8cb4533 GetCommandLineW CommandLineToArgvW 690 7ff8a8cb4b5b-7ff8a8cb4b5e LocalFree 689->690 691 7ff8a8cb4539-7ff8a8cb453c 689->691 693 7ff8a8cb4b64-7ff8a8cb4b8a call 7ff8a8cf5ec0 690->693 692 7ff8a8cb4540-7ff8a8cb4554 call 7ff8a8cf77d0 691->692 698 7ff8a8cb4556-7ff8a8cb455e 692->698 699 7ff8a8cb4565-7ff8a8cb4567 692->699 698->692 700 7ff8a8cb4560 698->700 699->690 701 7ff8a8cb456d-7ff8a8cb4575 699->701 700->690 701->690 702 7ff8a8cb457b-7ff8a8cb459a lstrcmpW 701->702 703 7ff8a8cb45b4-7ff8a8cb45d2 GetCurrentProcess IsWow64Process 702->703 704 7ff8a8cb459c-7ff8a8cb45ae lstrcmpW 702->704 706 7ff8a8cb45d4-7ff8a8cb4623 call 7ff8a8cf7a20 call 7ff8a8c9e810 MessageBoxW 703->706 707 7ff8a8cb4628-7ff8a8cb4637 703->707 704->703 705 7ff8a8cb482a-7ff8a8cb483c lstrcmpW 704->705 711 7ff8a8cb4842-7ff8a8cb4846 705->711 712 7ff8a8cb4941-7ff8a8cb4953 lstrcmpW 705->712 706->693 708 7ff8a8cb4822 707->708 709 7ff8a8cb463d-7ff8a8cb464a 707->709 708->705 714 7ff8a8cb4650-7ff8a8cb4657 709->714 711->712 713 7ff8a8cb484c-7ff8a8cb48ac call 7ff8a8cf7a20 call 7ff8a8cbc7b0 711->713 715 7ff8a8cb4a4b-7ff8a8cb4a5d lstrcmpW 712->715 716 7ff8a8cb4959-7ff8a8cb495d 712->716 753 7ff8a8cb48eb-7ff8a8cb490b call 7ff8a8cb4d20 713->753 754 7ff8a8cb48ae 713->754 719 7ff8a8cb480e-7ff8a8cb4814 714->719 720 7ff8a8cb465d-7ff8a8cb466c lstrcmpW 714->720 722 7ff8a8cb4a7a-7ff8a8cb4a8c lstrcmpW 715->722 723 7ff8a8cb4a5f-7ff8a8cb4a63 715->723 716->715 721 7ff8a8cb4963-7ff8a8cb498b call 7ff8a8cf7a20 FindFirstFileW 716->721 719->714 732 7ff8a8cb481a 719->732 729 7ff8a8cb467b-7ff8a8cb468e lstrcmpW 720->729 730 7ff8a8cb466e-7ff8a8cb4676 720->730 746 7ff8a8cb4991-7ff8a8cb49bd FindClose call 7ff8a8cbf290 call 7ff8a8cf77d0 721->746 747 7ff8a8cb4a3c-7ff8a8cb4a46 call 7ff8a8cbf4b0 721->747 726 7ff8a8cb4b06-7ff8a8cb4b18 lstrcmpW 722->726 727 7ff8a8cb4a8e-7ff8a8cb4aa0 FindWindowW 722->727 723->722 733 7ff8a8cb4a65-7ff8a8cb4a75 call 7ff8a8cbf7b0 723->733 726->690 740 7ff8a8cb4b1a-7ff8a8cb4b25 lstrlenW 726->740 734 7ff8a8cb4aa2-7ff8a8cb4aaf SendMessageW 727->734 735 7ff8a8cb4ab5-7ff8a8cb4ac8 IsWindow 727->735 737 7ff8a8cb4690-7ff8a8cb46a2 lstrcmpW 729->737 738 7ff8a8cb46b1-7ff8a8cb46c4 lstrcmpW 729->738 730->719 732->708 733->690 734->735 742 7ff8a8cb4aca-7ff8a8cb4aea PostMessageW call 7ff8a8c9e340 735->742 743 7ff8a8cb4aef-7ff8a8cb4b04 call 7ff8a8cbdbe0 SHDeleteKeyW 735->743 737->738 745 7ff8a8cb46a4-7ff8a8cb46ac 737->745 748 7ff8a8cb46c6-7ff8a8cb46d8 lstrcmpW 738->748 749 7ff8a8cb46e7-7ff8a8cb46f4 lstrlenW 738->749 740->690 750 7ff8a8cb4b27-7ff8a8cb4b39 lstrcmpW 740->750 742->743 743->690 745->719 787 7ff8a8cb49c4-7ff8a8cb4a0a call 7ff8a8cf7a20 GetTempFileNameW call 7ff8a8cf7720 746->787 788 7ff8a8cb49bf-7ff8a8cb49c2 746->788 747->690 748->749 758 7ff8a8cb46da-7ff8a8cb46e2 748->758 749->719 761 7ff8a8cb46fa-7ff8a8cb472e 749->761 759 7ff8a8cb4b42-7ff8a8cb4b54 lstrcmpW 750->759 760 7ff8a8cb4b3b-7ff8a8cb4b40 call 7ff8a8cbda00 750->760 753->690 783 7ff8a8cb4911-7ff8a8cb492d call 7ff8a8cbc7b0 753->783 763 7ff8a8cb48b0-7ff8a8cb48c3 lstrcmpW 754->763 758->719 759->690 762 7ff8a8cb4b56 call 7ff8a8cbd910 759->762 760->690 769 7ff8a8cb4730-7ff8a8cb473a 761->769 762->690 771 7ff8a8cb4933-7ff8a8cb493c call 7ff8a8cbcd50 763->771 772 7ff8a8cb48c5-7ff8a8cb48e9 call 7ff8a8cbc7b0 763->772 776 7ff8a8cb4753-7ff8a8cb4780 lstrcmpW 769->776 777 7ff8a8cb473c-7ff8a8cb4744 769->777 771->690 772->753 772->763 776->719 780 7ff8a8cb4786-7ff8a8cb479f 776->780 777->776 778 7ff8a8cb4746-7ff8a8cb4751 777->778 778->769 778->776 785 7ff8a8cb47a4-7ff8a8cb47ae 780->785 783->690 783->771 790 7ff8a8cb47b0-7ff8a8cb47b8 785->790 791 7ff8a8cb47c7-7ff8a8cb47de 785->791 804 7ff8a8cb4a14-7ff8a8cb4a27 CopyFileW 787->804 805 7ff8a8cb4a0c-7ff8a8cb4a11 787->805 792 7ff8a8cb4a2e-7ff8a8cb4a38 call 7ff8a8cf7720 788->792 790->791 796 7ff8a8cb47ba-7ff8a8cb47c5 790->796 798 7ff8a8cb47e0-7ff8a8cb47f2 791->798 792->747 796->785 796->791 798->719 801 7ff8a8cb47f4-7ff8a8cb480c call 7ff8a8cb4d20 798->801 801->719 801->798 804->792 805->804
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: lstrcmp$Message$CloseFileFindPost$CommandLineProcessWindow$ArgvCopyCurrentDeleteFirstFreeLocalNameSendTempWow64lstrlen
                          • String ID: Error$NVIDIA RTX Desktop Manager$Please use %s to run this command$Software\NVIDIA Corporation\Global\nView$all$apps$desktop$dmflags$help$import$loadprofile$nView64.dll$nViewCmd$off$reset$saveprofile
                          • API String ID: 845202311-658622161
                          • Opcode ID: af96e32e7e3f32490f36427dad863ff3c901b93d2b8c288b0a39f5eb28aba3da
                          • Instruction ID: d455fab04eff2f628cd44b44a1be507afb0af16808fc7cb85fe2049214524f20
                          • Opcode Fuzzy Hash: af96e32e7e3f32490f36427dad863ff3c901b93d2b8c288b0a39f5eb28aba3da
                          • Instruction Fuzzy Hash: FB026132A1EA82EDEBA0DF21D8546B96364FF847C8F544136C61E47554DF3CEA48CB28
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$GetcollGetctypeGetvals
                          • String ID:
                          • API String ID: 553569086-0
                          • Opcode ID: eb9970fac7276ce7a5422af605279d452411ac343f3853041637fb2d45f605db
                          • Instruction ID: 80c929c60515b45046a3bcaeca8c6fb08fd1267ad316c18529385866ebf9d74d
                          • Opcode Fuzzy Hash: eb9970fac7276ce7a5422af605279d452411ac343f3853041637fb2d45f605db
                          • Instruction Fuzzy Hash: 65826D21A0BA42A5FB819F25D8802F833A5FF457C4F084035EA1E47396EF7DF8959768

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1593 7ff8a8d7e430-7ff8a8d7e474 SetLastError 1594 7ff8a8d7e47a-7ff8a8d7e484 1593->1594 1595 7ff8a8d7ea66-7ff8a8d7ea71 SetLastError 1593->1595 1596 7ff8a8d7e487-7ff8a8d7e48e 1594->1596 1597 7ff8a8d7ea73-7ff8a8d7ea99 call 7ff8a8cf5ec0 1595->1597 1596->1596 1599 7ff8a8d7e490-7ff8a8d7e493 1596->1599 1601 7ff8a8d7e495-7ff8a8d7e498 1599->1601 1602 7ff8a8d7e4c4-7ff8a8d7e4e0 call 7ff8a8d7d500 1599->1602 1604 7ff8a8d7e4a0-7ff8a8d7e4aa 1601->1604 1607 7ff8a8d7e6b7-7ff8a8d7e6c7 call 7ff8a8d7eaa0 1602->1607 1608 7ff8a8d7e4e6-7ff8a8d7e508 call 7ff8a8cf7a20 1602->1608 1604->1595 1606 7ff8a8d7e4b0-7ff8a8d7e4b5 1604->1606 1606->1595 1609 7ff8a8d7e4bb-7ff8a8d7e4c2 1606->1609 1616 7ff8a8d7e6cd 1607->1616 1617 7ff8a8d7ea44-7ff8a8d7ea59 LocalFree * 2 1607->1617 1614 7ff8a8d7e50e 1608->1614 1615 7ff8a8d7e5ac-7ff8a8d7e5b1 call 7ff8a8d7bbd0 1608->1615 1609->1602 1609->1604 1618 7ff8a8d7e511-7ff8a8d7e51d GetModuleHandleW 1614->1618 1627 7ff8a8d7e5b6-7ff8a8d7e5be 1615->1627 1620 7ff8a8d7e6d0-7ff8a8d7e6d9 1616->1620 1621 7ff8a8d7ea5f-7ff8a8d7ea61 1617->1621 1622 7ff8a8d7e77b-7ff8a8d7e783 GetLastError 1617->1622 1623 7ff8a8d7e51f-7ff8a8d7e537 GetModuleFileNameW 1618->1623 1624 7ff8a8d7e56c-7ff8a8d7e57d 1618->1624 1620->1620 1628 7ff8a8d7e6db-7ff8a8d7e6de 1620->1628 1629 7ff8a8d7e788 SetLastError 1621->1629 1625 7ff8a8d7e78e-7ff8a8d7e7a1 1622->1625 1626 7ff8a8d7e785 1622->1626 1623->1624 1631 7ff8a8d7e539-7ff8a8d7e541 1623->1631 1624->1618 1630 7ff8a8d7e57f 1624->1630 1625->1597 1626->1629 1632 7ff8a8d7e5c0-7ff8a8d7e5c7 1627->1632 1633 7ff8a8d7e6e0-7ff8a8d7e6e9 1628->1633 1629->1625 1634 7ff8a8d7e5a5-7ff8a8d7e5aa 1630->1634 1635 7ff8a8d7e543-7ff8a8d7e546 1631->1635 1636 7ff8a8d7e581-7ff8a8d7e58a 1631->1636 1632->1632 1637 7ff8a8d7e5c9-7ff8a8d7e5cc 1632->1637 1633->1633 1638 7ff8a8d7e6eb-7ff8a8d7e6ff 1633->1638 1634->1615 1634->1627 1635->1636 1640 7ff8a8d7e548-7ff8a8d7e551 call 7ff8a8d41af0 1635->1640 1639 7ff8a8d7e590-7ff8a8d7e594 1636->1639 1641 7ff8a8d7e5d0-7ff8a8d7e5d7 1637->1641 1642 7ff8a8d7e719-7ff8a8d7e721 1638->1642 1643 7ff8a8d7e701-7ff8a8d7e708 1638->1643 1645 7ff8a8d7e59f 1639->1645 1646 7ff8a8d7e596-7ff8a8d7e59d 1639->1646 1640->1624 1659 7ff8a8d7e553-7ff8a8d7e559 1640->1659 1641->1641 1648 7ff8a8d7e5d9-7ff8a8d7e5dc 1641->1648 1644 7ff8a8d7e724-7ff8a8d7e72c 1642->1644 1643->1642 1649 7ff8a8d7e70a-7ff8a8d7e70e 1643->1649 1644->1644 1650 7ff8a8d7e72e-7ff8a8d7e731 1644->1650 1645->1634 1646->1639 1646->1645 1652 7ff8a8d7e5de-7ff8a8d7e5e4 1648->1652 1653 7ff8a8d7e5f7 1648->1653 1649->1642 1654 7ff8a8d7e710-7ff8a8d7e717 1649->1654 1656 7ff8a8d7e867-7ff8a8d7e883 LocalAlloc 1650->1656 1657 7ff8a8d7e737-7ff8a8d7e73b 1650->1657 1652->1653 1655 7ff8a8d7e5e6-7ff8a8d7e5e9 1652->1655 1658 7ff8a8d7e5fa-7ff8a8d7e61f LocalAlloc 1653->1658 1654->1642 1654->1643 1655->1653 1660 7ff8a8d7e5eb-7ff8a8d7e5f5 1655->1660 1665 7ff8a8d7e8d6-7ff8a8d7e8dc 1656->1665 1666 7ff8a8d7e885-7ff8a8d7e898 call 7ff8a8ca1a00 1656->1666 1661 7ff8a8d7e7c1-7ff8a8d7e7c8 1657->1661 1662 7ff8a8d7e741 1657->1662 1663 7ff8a8d7e695 1658->1663 1664 7ff8a8d7e621-7ff8a8d7e633 call 7ff8a8ca1a00 1658->1664 1659->1624 1667 7ff8a8d7e55b-7ff8a8d7e564 1659->1667 1660->1653 1660->1658 1670 7ff8a8d7e7ce 1661->1670 1671 7ff8a8d7e862-7ff8a8d7e865 1661->1671 1673 7ff8a8d7e744-7ff8a8d7e74b 1662->1673 1672 7ff8a8d7e698-7ff8a8d7e6a4 GetFileAttributesW 1663->1672 1688 7ff8a8d7e646-7ff8a8d7e649 1664->1688 1689 7ff8a8d7e635-7ff8a8d7e644 LocalFree 1664->1689 1675 7ff8a8d7e8e0-7ff8a8d7e8e6 1665->1675 1683 7ff8a8d7e89a LocalFree 1666->1683 1684 7ff8a8d7e8a5-7ff8a8d7e8b6 call 7ff8a8cc05b0 1666->1684 1667->1636 1669 7ff8a8d7e566-7ff8a8d7e56a 1667->1669 1669->1624 1669->1636 1677 7ff8a8d7e7d1-7ff8a8d7e7d8 1670->1677 1671->1675 1678 7ff8a8d7e6ae-7ff8a8d7e6b1 LocalFree 1672->1678 1679 7ff8a8d7e6a6-7ff8a8d7e6a8 1672->1679 1673->1673 1680 7ff8a8d7e74d-7ff8a8d7e765 LocalAlloc 1673->1680 1675->1617 1682 7ff8a8d7e8ec 1675->1682 1677->1677 1685 7ff8a8d7e7da-7ff8a8d7e7f9 LocalAlloc 1677->1685 1678->1607 1679->1617 1679->1678 1686 7ff8a8d7e767-7ff8a8d7e775 LocalFree * 2 1680->1686 1687 7ff8a8d7e7a6-7ff8a8d7e7b6 call 7ff8a8ca1990 1680->1687 1690 7ff8a8d7e8f0-7ff8a8d7e8fc 1682->1690 1683->1684 1684->1665 1709 7ff8a8d7e8b8-7ff8a8d7e8bb LocalFree 1684->1709 1685->1686 1691 7ff8a8d7e7ff-7ff8a8d7e802 1685->1691 1686->1622 1687->1665 1712 7ff8a8d7e7bc 1687->1712 1693 7ff8a8d7e64b-7ff8a8d7e65f call 7ff8a8cc05b0 1688->1693 1694 7ff8a8d7e672-7ff8a8d7e682 call 7ff8a8cc05b0 1688->1694 1689->1672 1690->1690 1696 7ff8a8d7e8fe-7ff8a8d7e908 1690->1696 1699 7ff8a8d7e8ca-7ff8a8d7e8d3 LocalFree 1691->1699 1700 7ff8a8d7e808-7ff8a8d7e80f 1691->1700 1693->1694 1717 7ff8a8d7e661-7ff8a8d7e670 LocalFree 1693->1717 1694->1663 1713 7ff8a8d7e684-7ff8a8d7e693 LocalFree 1694->1713 1697 7ff8a8d7e90a 1696->1697 1698 7ff8a8d7e928-7ff8a8d7e941 call 7ff8a8d5cb84 1696->1698 1705 7ff8a8d7e910-7ff8a8d7e917 1697->1705 1719 7ff8a8d7e95a-7ff8a8d7e96b call 7ff8a8d5cb84 1698->1719 1720 7ff8a8d7e943-7ff8a8d7e94b GetLastError 1698->1720 1699->1665 1707 7ff8a8d7e8c6 1700->1707 1708 7ff8a8d7e815-7ff8a8d7e81c 1700->1708 1705->1698 1714 7ff8a8d7e919-7ff8a8d7e91d 1705->1714 1707->1699 1708->1707 1716 7ff8a8d7e822-7ff8a8d7e82b 1708->1716 1709->1707 1712->1699 1713->1672 1714->1698 1718 7ff8a8d7e91f-7ff8a8d7e926 1714->1718 1721 7ff8a8d7e830-7ff8a8d7e837 1716->1721 1717->1672 1718->1698 1718->1705 1731 7ff8a8d7ea0a-7ff8a8d7ea0d 1719->1731 1732 7ff8a8d7e971-7ff8a8d7e974 1719->1732 1720->1719 1722 7ff8a8d7e94d-7ff8a8d7e957 call 7ff8a8d7b060 1720->1722 1723 7ff8a8d7e84f-7ff8a8d7e85e 1721->1723 1724 7ff8a8d7e839-7ff8a8d7e840 1721->1724 1722->1719 1723->1665 1728 7ff8a8d7e860 1723->1728 1724->1723 1727 7ff8a8d7e842-7ff8a8d7e84d 1724->1727 1727->1721 1727->1723 1728->1699 1731->1617 1733 7ff8a8d7ea0f-7ff8a8d7ea17 GetLastError 1731->1733 1732->1617 1734 7ff8a8d7e97a-7ff8a8d7e982 GetLastError 1732->1734 1733->1617 1737 7ff8a8d7ea19-7ff8a8d7ea41 call 7ff8a8d7b560 1733->1737 1735 7ff8a8d7e9cc-7ff8a8d7e9d4 GetLastError 1734->1735 1736 7ff8a8d7e984-7ff8a8d7e9ca call 7ff8a8d7b560 1734->1736 1735->1733 1739 7ff8a8d7e9d6-7ff8a8d7ea07 call 7ff8a8d7b300 1735->1739 1736->1617 1736->1735 1737->1617 1739->1731
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Local$Free$ErrorLast$Alloc$FileModule$AttributesHandleName
                          • String ID: .dll$.sys$:$DriverSupportModules$OpenGLDriverName$SOFTWARE\Khronos\OpenCL\Vendors$SOFTWARE\Khronos\Vulkan\Drivers$UserModeDListDriverName$UserModeDriverName$\
                          • API String ID: 3095336257-587262334
                          • Opcode ID: e7d1ff6006397a2d31631a9101f740d8f38d0298ef01ba6ec7142598ec224844
                          • Instruction ID: a12c8746d5c6be113bc38f6dd6948131f0d5d668aa427fbb491a950354f25187
                          • Opcode Fuzzy Hash: e7d1ff6006397a2d31631a9101f740d8f38d0298ef01ba6ec7142598ec224844
                          • Instruction Fuzzy Hash: D5029051B0B642A6FE64AB11940437A63A4FF85FD4F984535CA2E477E0EF3CE909C328

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1745 7ff8a8d959e0-7ff8a8d95a2d call 7ff8a8cb5ed0 1748 7ff8a8d95a33-7ff8a8d95a7c SHDeleteKeyW call 7ff8a8cb5e70 1745->1748 1749 7ff8a8d95e86-7ff8a8d95eb1 RegCloseKey call 7ff8a8cf5ec0 1745->1749 1754 7ff8a8d95a82-7ff8a8d95a8a 1748->1754 1755 7ff8a8d95e7e 1748->1755 1756 7ff8a8d95a92-7ff8a8d95aa1 call 7ff8a8d94dd0 1754->1756 1755->1749 1759 7ff8a8d95e62-7ff8a8d95e68 1756->1759 1760 7ff8a8d95aa7-7ff8a8d95aab 1756->1760 1759->1756 1761 7ff8a8d95e6e-7ff8a8d95e76 1759->1761 1760->1759 1762 7ff8a8d95ab1-7ff8a8d95b18 call 7ff8a8d944a0 call 7ff8a8cb5e70 lstrlenW RegSetValueExW 1760->1762 1761->1755 1767 7ff8a8d95b49-7ff8a8d95b4b 1762->1767 1768 7ff8a8d95b1a-7ff8a8d95b46 RegSetValueExW 1762->1768 1769 7ff8a8d95b4d-7ff8a8d95b7c RegSetValueExW 1767->1769 1770 7ff8a8d95b7f-7ff8a8d95b81 1767->1770 1768->1767 1769->1770 1771 7ff8a8d95c41-7ff8a8d95c43 1770->1771 1772 7ff8a8d95b87-7ff8a8d95c3e call 7ff8a8cbcad0 lstrlenW RegSetValueExW lstrlenW RegSetValueExW 1770->1772 1773 7ff8a8d95c45-7ff8a8d95c78 lstrlenW RegSetValueExW 1771->1773 1774 7ff8a8d95c7b-7ff8a8d95c7d 1771->1774 1772->1771 1773->1774 1777 7ff8a8d95c83-7ff8a8d95c8a 1774->1777 1778 7ff8a8d95d18-7ff8a8d95d1d 1774->1778 1779 7ff8a8d95c90 call 7ff8a8cf7a20 1777->1779 1778->1759 1780 7ff8a8d95d23-7ff8a8d95d59 1778->1780 1781 7ff8a8d95c95-7ff8a8d95cae 1779->1781 1782 7ff8a8d95d5d call 7ff8a8cf7a20 1780->1782 1783 7ff8a8d95cb0-7ff8a8d95cba 1781->1783 1784 7ff8a8d95d62-7ff8a8d95e5c call 7ff8a8d94a70 RegSetValueExW * 4 lstrlenW RegSetValueExW 1782->1784 1785 7ff8a8d95cd3-7ff8a8d95d12 lstrlenW RegSetValueExW 1783->1785 1786 7ff8a8d95cbc-7ff8a8d95cc4 1783->1786 1784->1759 1785->1778 1786->1785 1789 7ff8a8d95cc6-7ff8a8d95cd1 1786->1789 1789->1783 1789->1785
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Value$lstrlen$CloseCreate$CurrentDeleteOpenUser
                          • String ID: Action$Alt$Application$Ctrl$Desktop$DesktopGUID$Flags$Hotkeys$Key$MonGridID$Profile$Shift$Software\NVIDIA Corporation\Global\nView$Window
                          • API String ID: 1715684290-2541343727
                          • Opcode ID: a33a7fb957cd7eaee88febeababe780ee3a1b426742b96cacf49444184a1573b
                          • Instruction ID: 9f5f3b910abb8dc0fa39c6148fe6311c853b94623d27b91cb8fb3c342292f37a
                          • Opcode Fuzzy Hash: a33a7fb957cd7eaee88febeababe780ee3a1b426742b96cacf49444184a1573b
                          • Instruction Fuzzy Hash: 3DD19172719B81EAEB60DF15E4806AAB3A1FB857C8F444031EA9D47B58DF3DD508CB18
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getcoll$Getvals
                          • String ID:
                          • API String ID: 3082291583-0
                          • Opcode ID: 8b1a8ad9373894655f5b98a5904e86640b72ee8057499afeee4d687079a7b8ae
                          • Instruction ID: 07dff072519c53b0ad4f1123e9f6b377648f1959d23de3849d37410d79375221
                          • Opcode Fuzzy Hash: 8b1a8ad9373894655f5b98a5904e86640b72ee8057499afeee4d687079a7b8ae
                          • Instruction Fuzzy Hash: 77328F21A0BB42A5FB81AB15E8801F937A4FF447C4F084036EA5D47396DFBDE895D728
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$ExecuteMessageShell$CloseDirectoryFileFindFirstOpenQuerySystemValuewsprintf
                          • String ID: %s\%s$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\API\api.cpp$Microsoft .NET Framework version 4.5 not found$Release$SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full$Visual Studio runtime files not found. Missing files: %s$concrt140.dll$https://support.microsoft.com/en-us/help/2977003/the-latest-supported-visual-c-downloads$https://www.microsoft.com/en-us/download/details.aspx?id=30653$msvcp140.dll$nViewNextPrerequisites$ucrtbase.dll$vcruntime140.dll
                          • API String ID: 3649593368-1552898045
                          • Opcode ID: 76400e30a974e8f5e9d73e3c665554da6959c16fe51498c2c3841d7ff0eecdd7
                          • Instruction ID: 99751a001cb45fe1602c386880aa99116668ad898df9553436e6132d18adede7
                          • Opcode Fuzzy Hash: 76400e30a974e8f5e9d73e3c665554da6959c16fe51498c2c3841d7ff0eecdd7
                          • Instruction Fuzzy Hash: 1722C332B19B8199FB00CB64E4443AE6361FB847D8F504236EA9D17BA9DF7CD584CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: MessageWindow$_invalid_parameter_noinfo_noreturn$CurrentForegroundString$DebugExecuteFindIconicLoadOutputPostProcessSendShellShowThreadlstrlen
                          • String ID: -NVIDIA RTX / Quadro GPU -NVIDIA display driver -Windows 10 and above$%s\%s$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\API\api.cpp$I$NVIDIA RTX Desktop Manager$NVRunControlPanel$Unsupported OS$Unsupported hardware$launching nViewUI: %s$nvwdmcpl.exe$open
                          • API String ID: 2858304055-2235191580
                          • Opcode ID: 3b7aaa0a93482d8f6ad9bb87dc17b7584b97f12eecb72b208f21b382525c2294
                          • Instruction ID: f687d198e4afb329409b76d72a91050024755f564cf645b8b7dc4b885e78eea0
                          • Opcode Fuzzy Hash: 3b7aaa0a93482d8f6ad9bb87dc17b7584b97f12eecb72b208f21b382525c2294
                          • Instruction Fuzzy Hash: 75C10931A0AF82A9EB509F51E4443AAB361FB84BD0F504131EA5D03BD5DF7CE609CB68
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Local$AddressProc$Alloc$ErrorLast$Free$AttributesConditionFileInfoMaskVerifyVersion
                          • String ID: $SetupDiDestroyDeviceInfoList$SetupDiGetDevicePropertyW$SetupGetInfDriverStoreLocationW$Setupapi.dll$nvpowerapi.dll
                          • API String ID: 1387798821-1672175376
                          • Opcode ID: 7938c3c11da2e768b2bf2cffff8ebf29a0eb7d785a9e632486101e1a35ebee19
                          • Instruction ID: 3f5fb8e59c7c79f2467a3b75444954abc178dc26506fa0dad5cb4b2f0c61d5b3
                          • Opcode Fuzzy Hash: 7938c3c11da2e768b2bf2cffff8ebf29a0eb7d785a9e632486101e1a35ebee19
                          • Instruction Fuzzy Hash: B4C18221E0BB42A6EA649F25E4043B9A3E0FF84BD0F544535DA6D43794EF7CE909C728
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$GetctypeYarn
                          • String ID:
                          • API String ID: 3181430533-0
                          • Opcode ID: 40d908191ac89458b9bd64ae39b4a4ce898169b569b4ff879f9e6d1f2ef22ad1
                          • Instruction ID: c656263f475ac8540328161a9a2fd52da2620f08b88d2d80d18ce2425fec04da
                          • Opcode Fuzzy Hash: 40d908191ac89458b9bd64ae39b4a4ce898169b569b4ff879f9e6d1f2ef22ad1
                          • Instruction Fuzzy Hash: 3DE1DDA1E0BA82A4FB86EB16D8401F532A1FF40BD0F044032EA1D43B95DF7DA955DB68
                          APIs
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • SHDeleteKeyW.SHLWAPI ref: 00007FF8A8CB21F2
                            • Part of subcall function 00007FF8A8CB5E70: RegCreateKeyExW.ADVAPI32 ref: 00007FF8A8CB5EA6
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CB23A1
                            • Part of subcall function 00007FF8A8CB6490: RegSetValueExW.ADVAPI32 ref: 00007FF8A8CB64B4
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CB2396
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$Create$CurrentDeleteOpenUserValue
                          • String ID: BlockSpanning$BlockSpanningChild$ButtonBar$CenterDialog$DetectPhyMon$EdgeSnap$ModKeysForMaxClick$OpenDialogOnMonGridId$OpenOnMonGridId$PinSnappedWindows$PixelSnap$Software\NVIDIA Corporation\Global\nView$SystemMenu$TransparentDrag$Tweak
                          • API String ID: 2025164383-1789854249
                          • Opcode ID: aac718f724d0e25659d22fad6662a43b7643f0d7ee298d9cd8203a960eb42b77
                          • Instruction ID: bb2a64d5e78cce4b9626a9f09287e9c9f88ca09824f48bf9b50c680415fbc454
                          • Opcode Fuzzy Hash: aac718f724d0e25659d22fad6662a43b7643f0d7ee298d9cd8203a960eb42b77
                          • Instruction Fuzzy Hash: 7D51BF72B29912EDDB10EB16E8448697770FB81BC8F405439DA4D47A6ACF2EE544CF28
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Local$ConditionMask$Free$AllocFullInfoNamePathVerifyVersion$AddressProc
                          • String ID: $$&$*$SHGetFolderPathW$Shell32.dll
                          • API String ID: 4287201591-2843092907
                          • Opcode ID: 4e515483ef525b14cf75bbcf8ee3eef417490b571eebfe8d14b5619236c38aef
                          • Instruction ID: 5ffba505469f4bc9c63aab471c59eb0ff9f37b645574cf3302761ca58411d472
                          • Opcode Fuzzy Hash: 4e515483ef525b14cf75bbcf8ee3eef417490b571eebfe8d14b5619236c38aef
                          • Instruction Fuzzy Hash: 1581C221E1B642A6FB548F11E84437966A5FF84BD8F544235CD2E87398DF3CE809C728
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseCreateQueryValue
                          • String ID: BlockSpanning$BlockSpanningChild$ButtonBar$CenterDialog$DetectPhyMon$EdgeSnap$ModKeysForMaxClick$OpenDialogOnMonGridId$OpenOnMonGridId$PinSnappedWindows$PixelSnap$ProfileChanged$SystemMenu$TransparentDrag$Tweak
                          • API String ID: 4083198587-1185207445
                          • Opcode ID: 611b28d5e63ef7bdc19d7173627d4fb396db35d9d964237f5ed65055ecd43b93
                          • Instruction ID: a8826a75cd3f4adec5287c4f64af1be6ff287ea162504d9bdf96852ef7896bdb
                          • Opcode Fuzzy Hash: 611b28d5e63ef7bdc19d7173627d4fb396db35d9d964237f5ed65055ecd43b93
                          • Instruction Fuzzy Hash: B9717C73500A86DEEB61DF74C8456DA37A0F74878CF455222E65C87618CF3CE209CB95
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Library$AddressCapsDeviceFreeLoadProcRelease$FromMonitorPoint
                          • String ID: GetDpiForMonitor$GetProcessDpiAwareness$Shcore.dll
                          • API String ID: 3559264585-3014081823
                          • Opcode ID: 5a960cff26e239f528bd3c27602ba77d899f541b51555e10074ec4032f1fbe80
                          • Instruction ID: 2d9838b81bd799ef6df1f5614a330b02d9644b0b47ef3df3a63d6b2cc5a07f09
                          • Opcode Fuzzy Hash: 5a960cff26e239f528bd3c27602ba77d899f541b51555e10074ec4032f1fbe80
                          • Instruction Fuzzy Hash: B3419372A0BB429EEA45DB65E844179B3A0EF887D1F184034DD2D4B794EF7CE849C724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$Current$HandleOpen$FileInfoProcessQuerySystemThreadUserValueView
                          • String ID: %s %d$*P$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\SharedData\MemoryManager.cpp$Failed to create shared heap memory.$Failed to map shared heap memory.$ShareHeapMemoryWithProcess$SharedMemorySize$Software\NVIDIA Corporation\Global\nView$nView Shared Memory
                          • API String ID: 458693518-221517220
                          • Opcode ID: efb547220dbf658a7d25a490300fb5f43486cdb7a754d46d62a50b696b50be32
                          • Instruction ID: 1301fe7eaf62426eaf598d953eecae139508fa0af4f0ad82cf28507032d6694a
                          • Opcode Fuzzy Hash: efb547220dbf658a7d25a490300fb5f43486cdb7a754d46d62a50b696b50be32
                          • Instruction Fuzzy Hash: A3515331A1AB86EAEB60DF10E4446AAB7A5FF847C0F504135EA8D07B55DF3CD505CB28
                          APIs
                          • CreateMutexW.KERNEL32 ref: 00007FF8A8C9E11F
                          • CreateMutexW.KERNEL32 ref: 00007FF8A8C9E137
                          • CreateMutexW.KERNEL32 ref: 00007FF8A8C9E14F
                          • CreateEventW.KERNEL32 ref: 00007FF8A8C9E16D
                          • CreateEventW.KERNEL32 ref: 00007FF8A8C9E188
                          • CreateEventW.KERNEL32 ref: 00007FF8A8C9E1A5
                          • CreateEventW.KERNEL32 ref: 00007FF8A8C9E1C2
                            • Part of subcall function 00007FF8A8CB6630: GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB6666
                            • Part of subcall function 00007FF8A8CB6630: GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB668F
                            • Part of subcall function 00007FF8A8CB6630: GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB6697
                            • Part of subcall function 00007FF8A8CB6630: SetSecurityInfo.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB66C4
                            • Part of subcall function 00007FF8A8CB6630: LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB66D1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Create$Event$Mutex$ErrorLastSecurity$DescriptorFreeInfoLocalSacl
                          • String ID: S:(ML;;NW;;;LW)$nView Profile Manager Event$nView Read Mutex Event$nView Shared Memory Mutex$nView Shared PseudoMaxWindowData Mutex$nView Shared Window Mutex$nView Window Event$nView Window Shutdown Event
                          • API String ID: 1592442595-193518498
                          • Opcode ID: 6ea4a8f3bba134ed2b4b5aa0138bcef5a69c0d4356531f5712fd41b1f8faa6d6
                          • Instruction ID: 676f6c1a2790504bcdff2ef0cc69988f48ba1cf129ca804d69402fa8863cf6d7
                          • Opcode Fuzzy Hash: 6ea4a8f3bba134ed2b4b5aa0138bcef5a69c0d4356531f5712fd41b1f8faa6d6
                          • Instruction Fuzzy Hash: 6B310670D1BA47B9EB04DB25F8598B923A1EF48384F818036C42E8B164DF7DA50DE768
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CommandFileLine$InfoVersion$ArgvCharCurrentFreeLocalLowerModuleNameProcessQuerySizeValue_invalid_parameter_noinfo_noreturn
                          • String ID: .dll
                          • API String ID: 351643083-2738580789
                          • Opcode ID: ee55545bb217703242af2cd6e3cb907f548e3cb6a435a54d1587f7f1120d71e3
                          • Instruction ID: dbae8cbf7e3fa1e31c83c53eec2b58fafc3fb5ce8cdaeda064ef44aebaacf27b
                          • Opcode Fuzzy Hash: ee55545bb217703242af2cd6e3cb907f548e3cb6a435a54d1587f7f1120d71e3
                          • Instruction Fuzzy Hash: 2402D822B1AB82A9EF909F11E4482BA63A1FF84BD0F845131EA5E037D4DF7CD645CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CreateInitializeInstance
                          • String ID: D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\Util\MSDesktopAPI.cpp$DesktopManagerInternal_V0$DesktopManagerInternal_V1$DesktopManagerInternal_V2$DesktopManagerInternal_V2b$DesktopManagerInternal_V3$DesktopManagerInternal_V3b$DesktopManagerInternal_V3c$MSDeskManAPI::init$MSDeskManAPI::init failed$New OS build (%d). Desktop manager interface not yet configured.
                          • API String ID: 3519745914-2889137641
                          • Opcode ID: cc978284beaf1e69a9ee51884f029d6ca80f69266233cb8161d70d8ecb64ec0d
                          • Instruction ID: ff6c97c111fe64723fef7dda6c5f89d7319904c8f53a611adbc0f070379224b0
                          • Opcode Fuzzy Hash: cc978284beaf1e69a9ee51884f029d6ca80f69266233cb8161d70d8ecb64ec0d
                          • Instruction Fuzzy Hash: B9225D72A0AB86B9EB019F75E8446E93761FB44BC8F800532D95D03665EF7CE64CC3A4
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: MetricsSystem$InfoMonitor_invalid_parameter_noinfo_noreturnlstrcpy$DevicesDisplayEnum
                          • String ID: h
                          • API String ID: 1820462889-2439710439
                          • Opcode ID: 2c70f02329578cc70341e1e27362dfd8920d11904d4265269f9fbbbe8eb33c09
                          • Instruction ID: 9b90b0ecd9a52097f6019bf832d68685369537b237790cbe1d332cc0c338b69a
                          • Opcode Fuzzy Hash: 2c70f02329578cc70341e1e27362dfd8920d11904d4265269f9fbbbe8eb33c09
                          • Instruction Fuzzy Hash: 5DB1B673A05B8196EB50CF29E44036DB7A1F784B94F109222EB9E536A5DF7CE585CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: FreeLocal$DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesErrorFileLastMapping
                          • String ID: S:(ML;;NW;;;LW)
                          • API String ID: 3392393586-495562761
                          • Opcode ID: 1bad6f8359a5bfc7530f1a812a5409b517a125bc2b6b65261657b1f3283d3b3c
                          • Instruction ID: bf65bdfb1b035d21c53e3ad399b065a441580e36a202a2a7a765c5f730df59ee
                          • Opcode Fuzzy Hash: 1bad6f8359a5bfc7530f1a812a5409b517a125bc2b6b65261657b1f3283d3b3c
                          • Instruction Fuzzy Hash: 5B515832E09B42EEE750CF61E4406ADB3A5FB987C8F044126EE4953A18DF78E519CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue_invalid_parameter_noinfo_noreturn$FromString
                          • String ID: Control Panel\Desktop$TileWallpaper$TranscodedImageCache_%03d$Wallpaper$WallpaperStyle
                          • API String ID: 2260030714-562368168
                          • Opcode ID: 58c22acd00c85e2e3c20a1e4cddf4cc8598dcf5501e7e4f1ca6f4e8d328c5f4a
                          • Instruction ID: f2beb62b8cb4c24d9c4472c4b2be33e4d3fa206e39b9114aef54be08f39899fe
                          • Opcode Fuzzy Hash: 58c22acd00c85e2e3c20a1e4cddf4cc8598dcf5501e7e4f1ca6f4e8d328c5f4a
                          • Instruction Fuzzy Hash: 14E1AF72B26B82A9EB20CF24D4443ED2765FF44BD8F404236DA6C07A99DF38D649C318
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: MessagePost$MutexObjectReleaseSingleWait
                          • String ID: D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\SharedData\MemoryManager.cpp$Shared heap almost exhausted (%f KB of %f KB used). shutting down.$Shared heap mutex timeout$Shared heap mutex(ghSharedMemoryMutex) failed to release!$shared heap exhausted or damaged or allocation failed (%f KB of %f KB used)$smalloc
                          • API String ID: 2543929108-3687365048
                          • Opcode ID: 79b96d747b35ee4c05ec9f360447bf54240cd07d9b3a541f9229978cffabb7c6
                          • Instruction ID: 68d03afcdd30b4e6765f5b1255887870cd16131d8e0887fd599e58c35e178aa5
                          • Opcode Fuzzy Hash: 79b96d747b35ee4c05ec9f360447bf54240cd07d9b3a541f9229978cffabb7c6
                          • Instruction Fuzzy Hash: 3B91F532A0AB86AEE740CF55E8406A97361FF887C4F504231EA1D573A0DF7CE549CB18
                          APIs
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF8A8D850D5
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF8A8D850E1
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF8A8D850ED
                            • Part of subcall function 00007FF8A8C9D220: InitializeCriticalSection.KERNEL32 ref: 00007FF8A8C9D25C
                            • Part of subcall function 00007FF8A8C9D220: EnterCriticalSection.KERNEL32 ref: 00007FF8A8C9D275
                            • Part of subcall function 00007FF8A8C9D220: InitializeCriticalSection.KERNEL32 ref: 00007FF8A8C9D304
                            • Part of subcall function 00007FF8A8C9D220: LeaveCriticalSection.KERNEL32 ref: 00007FF8A8C9D31D
                            • Part of subcall function 00007FF8A8CB7E10: GetCurrentThreadId.KERNEL32 ref: 00007FF8A8CB7ECD
                            • Part of subcall function 00007FF8A8CB7E10: GetCurrentProcessId.KERNEL32 ref: 00007FF8A8CB7ED5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CriticalSection$_invalid_parameter_noinfo_noreturn$CurrentInitialize$EnterLeaveProcessThread
                          • String ID: 1$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\DisplayControl\IDisplayControl.cpp$Driver Version: %d Branch: %S$IDisplayControl::dbgInfo$NvAPI_GetDisplayDriverVersion failed$NvAPI_Initialize() failed!
                          • API String ID: 541882954-910750061
                          • Opcode ID: 6bf7f96a96899432d7a9962de481840790a07ea598be32b3515eae898c786fb2
                          • Instruction ID: d09fdf7c05ffa458213b1ae20b3cce3b184ad5ae4103255b566bbeb972ddc143
                          • Opcode Fuzzy Hash: 6bf7f96a96899432d7a9962de481840790a07ea598be32b3515eae898c786fb2
                          • Instruction Fuzzy Hash: F712E072B16A859AEB109F78D0446BD77A5FB48BD8F008232DE2D23795EF38E449C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Rect$Offset$LongWindow$Library$AddressCapsDeviceEqualFreeLoadProcReleaseZoomed
                          • String ID:
                          • API String ID: 2315504833-0
                          • Opcode ID: 7938429252dfd139527e3a0c5ce6ec32c612d9a1fc2835a3cb0d20f5b21fe383
                          • Instruction ID: a647d614410d52c3c1b74d401f0168017991759bce8ca3597e42070335251ea3
                          • Opcode Fuzzy Hash: 7938429252dfd139527e3a0c5ce6ec32c612d9a1fc2835a3cb0d20f5b21fe383
                          • Instruction Fuzzy Hash: 8AF1F332F1A9429EE7A48F79D4056BD77A1FB94388F048235DE4D53688DF3CAA80CB54
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: IntersectRect$_invalid_parameter_noinfo_noreturn$Library$AddressCapsDeviceFreeLoadProcRelease
                          • String ID:
                          • API String ID: 4222476805-0
                          • Opcode ID: 5f2a14ffc23a43a4d15a5f7ab3bf804fe6d62dac530410fa36961198e719c33e
                          • Instruction ID: 978caf4cb8ebdb44087257df14c4bd662baa68ba86c5c75a04c58f4dc307a998
                          • Opcode Fuzzy Hash: 5f2a14ffc23a43a4d15a5f7ab3bf804fe6d62dac530410fa36961198e719c33e
                          • Instruction Fuzzy Hash: EB22C222F16B42AEE7408B78C5442BC63A1EB597E8F10C331DE1D27789EF38A5858B54
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Window$Rect$LibraryLongOffset$AddressCapsDeviceFreeIntersectLoadProcRelease
                          • String ID:
                          • API String ID: 3950210419-0
                          • Opcode ID: e56d1bfdd64dc636d7b9f61a2e57054750449f6d146e1bc469f68ac32fadabc6
                          • Instruction ID: 5099f6ec80d24d83b646ade6bffc48a17fef262415fc49d785281af48676724a
                          • Opcode Fuzzy Hash: e56d1bfdd64dc636d7b9f61a2e57054750449f6d146e1bc469f68ac32fadabc6
                          • Instruction Fuzzy Hash: FFF19132A1D6918FE750CF79E44466EBBA1FB88784F244235EA8853E58DB7CE944CF04
                          APIs
                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00007FF8A8CC6854), ref: 00007FF8A8CC6494
                          • lstrlenW.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC64AE
                          • SetFilePointer.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC64D7
                            • Part of subcall function 00007FF8A8CC6350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC638C
                            • Part of subcall function 00007FF8A8CC6350: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC639E
                            • Part of subcall function 00007FF8A8CC6350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63BC
                            • Part of subcall function 00007FF8A8CC6350: ReadFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63E8
                            • Part of subcall function 00007FF8A8CC6350: lstrcmpW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63FA
                            • Part of subcall function 00007FF8A8CC6350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC6422
                          • ReadFile.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC6518
                          • lstrlenW.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC6521
                          • lstrcmpW.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC6535
                          • SetFilePointer.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC6550
                          • SetFilePointer.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC657A
                          • SetFilePointer.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC659C
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: File$Pointer$lstrlen$Readlstrcmp
                          • String ID:
                          • API String ID: 2633652498-0
                          • Opcode ID: 5c7f6d37b069e0b7fa644742dba946f14f9425766d13757877db5dfd2a59f378
                          • Instruction ID: e0a88538715f0f3cfad610c0da5bbf67fe00e6c1826b620e71f290effad85605
                          • Opcode Fuzzy Hash: 5c7f6d37b069e0b7fa644742dba946f14f9425766d13757877db5dfd2a59f378
                          • Instruction Fuzzy Hash: DA418C36B19B02A6EB50CB26E590A6A67A4FB88BC4F144035DE1E47B24DF3CE415CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Find$File$CloseFirstNext_invalid_parameter_noinfo_noreturnlstrcmp
                          • String ID: .tvp$nviewprivatedesktopstate
                          • API String ID: 273683669-1285013323
                          • Opcode ID: bc482b18241799cc7cc383f743fd426a5d76ad3e57b6702f575aea9e028fda48
                          • Instruction ID: 06776cda9f92ded231d92d590abc5d0519790990fc2a4905b8d66d42fff2bc32
                          • Opcode Fuzzy Hash: bc482b18241799cc7cc383f743fd426a5d76ad3e57b6702f575aea9e028fda48
                          • Instruction Fuzzy Hash: E991AF62F1AB82A5EFA08F24D4502BA6360FF847D4F904231DB5D07A95DF3CE945CB24
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Current$ProcessThread
                          • String ID: D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\DisplayControl\GPUInfo.cpp$GPU::initConnectedDisplayIds$GPU::initialize$GPUInfo::initialize$M$NvAPI function failed$NvAPI function failed with: '%S'$System has no GPUs
                          • API String ID: 2063062207-1478826396
                          • Opcode ID: e12b58331a5cc83c7b88d09b55de39221a6086a0bba0a32bba217e9da5d9fcaf
                          • Instruction ID: c037a3c35f072b725103c60449b7aeb2602b4bb26dffe7bc9749b02be64b9c51
                          • Opcode Fuzzy Hash: e12b58331a5cc83c7b88d09b55de39221a6086a0bba0a32bba217e9da5d9fcaf
                          • Instruction Fuzzy Hash: 61D1733160AB82BBE760DB61E4056EA73A4FB44384F400536EA6C57785DF3CE269C768
                          APIs
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF8A8CA3EFF
                            • Part of subcall function 00007FF8A8CB7DB0: OutputDebugStringW.KERNEL32(?,?,00000000,00007FF8A8CA3F9F), ref: 00007FF8A8CB7DCC
                            • Part of subcall function 00007FF8A8CA3AC0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF8A8CA4091
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$DebugOutputString
                          • String ID: PROCESS_DPI_UNAWARE: $PROCESS_SYSTEM_DPI_AWARE:$pos(%4i %4i) size(%4i %4i)
                          • API String ID: 2094900029-4252665117
                          • Opcode ID: 85a60f2d8ffb92b3b955a4c4e3d9345ff51b603904541ac03c4a1694e57f1e83
                          • Instruction ID: 55897ad3d30d000eadf1f04bc18af5eec3d4a26520462176be899802b40361df
                          • Opcode Fuzzy Hash: 85a60f2d8ffb92b3b955a4c4e3d9345ff51b603904541ac03c4a1694e57f1e83
                          • Instruction Fuzzy Hash: B3F10072B19B9196EB00CB69E8442AEA772FB84BD4F405231EE5D13B99DF3CD180CB14
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandledVirtual$AllocCaptureContextDebuggerPresentUnwind
                          • String ID:
                          • API String ID: 652048205-0
                          • Opcode ID: 74f302650ea22c8baa3c60128528fb1732c039564dfa2e4d10febfda72840b98
                          • Instruction ID: c90d505a06433633dcc27706b7bf22dfdba84e93fda8f59f683e24514809a82a
                          • Opcode Fuzzy Hash: 74f302650ea22c8baa3c60128528fb1732c039564dfa2e4d10febfda72840b98
                          • Instruction Fuzzy Hash: A4319832619F81DAEB60CF25E8402AE73A0FB88794F500135EA9D43B59DF3CD559CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcVersion
                          • String ID: RtlGetVersion$ntdll
                          • API String ID: 3310240892-2582309562
                          • Opcode ID: 9ad4d70b4b78172d6b67e09e83ebdb588ab0560248f2b6093a222692c4fac172
                          • Instruction ID: 4816acf7d909b9241b1a74c1ced63d2dc51a1b7fa5087803ab658113f7bf45b4
                          • Opcode Fuzzy Hash: 9ad4d70b4b78172d6b67e09e83ebdb588ab0560248f2b6093a222692c4fac172
                          • Instruction Fuzzy Hash: 1A410C30E1FA43EEFBA49B01E954A7976A1EB44784F104139C15E473A4DF6DAA04EE2C
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Library$AddressCapsConcurrency::cancel_current_taskDeviceFreeIntersectLoadProcRectRelease
                          • String ID:
                          • API String ID: 914197429-0
                          • Opcode ID: ff6eae971d30ab1e6decdfeafa8ae21a5593b25e77f18c9947d132378fdd522e
                          • Instruction ID: e9d66ad17ea5e768957f3b5fcfe2d6aea66a81c4a50dda8bba9abcbe97eb110e
                          • Opcode Fuzzy Hash: ff6eae971d30ab1e6decdfeafa8ae21a5593b25e77f18c9947d132378fdd522e
                          • Instruction Fuzzy Hash: 89B1E022E1A78292FB908B29E4803BAA361FB847D4F544235EA5D13798DF7CE485CB54
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$IntersectRect_invalid_parameter_noinfo
                          • String ID: %s.%d
                          • API String ID: 4259794798-645285463
                          • Opcode ID: 6438858dd273fba176203d8a1c05fd6ef383d212fa491cf30b253a11f741a631
                          • Instruction ID: e46f7d09820be0cd0e1bd2a1ddf7d08148180bbcea6768fdc46956f9a62a152a
                          • Opcode Fuzzy Hash: 6438858dd273fba176203d8a1c05fd6ef383d212fa491cf30b253a11f741a631
                          • Instruction Fuzzy Hash: AF22D372A1A7819AEBA0CF25E0443ADB7A1FB84784F548136EB8D47798DF3CE444CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: %
                          • API String ID: 3668304517-2567322570
                          • Opcode ID: e1c484600b04fc7f895425a5356948795cbabb543350465548e48a692336fa0e
                          • Instruction ID: a4bb364bcfcb4f2d8cce21aaf6239e99f3f7f60df0aa0207a315a8c311e03538
                          • Opcode Fuzzy Hash: e1c484600b04fc7f895425a5356948795cbabb543350465548e48a692336fa0e
                          • Instruction Fuzzy Hash: E5124322B09A85AAFB658B65D4503FDA7B2EB487C8F048131DE4D17B88DF3CD651CB24
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: .tvp
                          • API String ID: 2295610775-456222929
                          • Opcode ID: 351a18ee3c4bfc0fa618577d6e6c71d8ce391ff6eeb04e603b00059271ec316b
                          • Instruction ID: f8d203cf1fe907dcc5086bbdc2fdc909908113808b703a836d93f0687ea4514c
                          • Opcode Fuzzy Hash: 351a18ee3c4bfc0fa618577d6e6c71d8ce391ff6eeb04e603b00059271ec316b
                          • Instruction Fuzzy Hash: B24112A2F0A782B5EF908F66A5142B96294EF05FD0F588132DF1D077C1DF3CE9058A28
                          APIs
                          • SetFilePointer.KERNEL32 ref: 00007FF8A8CC683E
                            • Part of subcall function 00007FF8A8CC6460: SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00007FF8A8CC6854), ref: 00007FF8A8CC6494
                            • Part of subcall function 00007FF8A8CC6460: lstrlenW.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC64AE
                            • Part of subcall function 00007FF8A8CC6460: SetFilePointer.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC64D7
                            • Part of subcall function 00007FF8A8CC6460: ReadFile.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC6518
                            • Part of subcall function 00007FF8A8CC6460: lstrlenW.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC6521
                            • Part of subcall function 00007FF8A8CC6460: lstrcmpW.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC6535
                            • Part of subcall function 00007FF8A8CC6460: SetFilePointer.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC6550
                            • Part of subcall function 00007FF8A8CC6460: SetFilePointer.KERNEL32(?,00007FF8A8CC6854), ref: 00007FF8A8CC659C
                            • Part of subcall function 00007FF8A8CC6350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC638C
                            • Part of subcall function 00007FF8A8CC6350: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC639E
                            • Part of subcall function 00007FF8A8CC6350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63BC
                            • Part of subcall function 00007FF8A8CC6350: ReadFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63E8
                            • Part of subcall function 00007FF8A8CC6350: lstrcmpW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63FA
                            • Part of subcall function 00007FF8A8CC6350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC6422
                          • ReadFile.KERNEL32 ref: 00007FF8A8CC689A
                          • SetFilePointer.KERNEL32 ref: 00007FF8A8CC68C3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: File$Pointer$Readlstrlen$lstrcmp
                          • String ID:
                          • API String ID: 75621728-0
                          • Opcode ID: 4628df762a2c9ad44dbe37110d3e9d88100c24f7c384a6aa602117973b6464b4
                          • Instruction ID: 6caaf068e6bbdcaf774f7a7e86303286304aade5b4a6e3b7294c7394f7cca450
                          • Opcode Fuzzy Hash: 4628df762a2c9ad44dbe37110d3e9d88100c24f7c384a6aa602117973b6464b4
                          • Instruction Fuzzy Hash: 9221A032A18B8096E750CB22E5507AAB361FBDCB84F905236EF9D43A15DF3DD594CB10
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionRaise_clrfp
                          • String ID:
                          • API String ID: 15204871-0
                          • Opcode ID: 445a78162d4b561208518aedfd525f36912a18d5d31671df8a34e56dd08e83b2
                          • Instruction ID: ad35ec4b36bfba939b22c9336b17ad1028e9a9d4d4439bc7d358d96bc4cfb354
                          • Opcode Fuzzy Hash: 445a78162d4b561208518aedfd525f36912a18d5d31671df8a34e56dd08e83b2
                          • Instruction Fuzzy Hash: 5FB19F73602B958BEB19CF29C48636C3BE0F744B88F159822DB6D8B7A4CB39D455C714
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AsyncMetricsStateSystem
                          • String ID:
                          • API String ID: 542347558-0
                          • Opcode ID: 25c04f36ce1d6b5c479886bcc9e5070fa2ba877c9616e0a4635d709a58c51c0e
                          • Instruction ID: 470988c9c2befd7dd2c948a10fa5b8c2c8b0bd2cea33e73feccdf154bdea8c82
                          • Opcode Fuzzy Hash: 25c04f36ce1d6b5c479886bcc9e5070fa2ba877c9616e0a4635d709a58c51c0e
                          • Instruction Fuzzy Hash: D5D01261E1B501DEF748371198163752151EBA4381F940034C61A562C2DF0C5E898725
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID: $
                          • API String ID: 0-227171996
                          • Opcode ID: 9aef7e7826a67b4d21a31014a6df26468df639c0c0bef3d391eac087dff77cfb
                          • Instruction ID: 59d34955cbc2b96ac4b61ebdcc614db0f9e1713e096d2f7576f8a16372f09837
                          • Opcode Fuzzy Hash: 9aef7e7826a67b4d21a31014a6df26468df639c0c0bef3d391eac087dff77cfb
                          • Instruction Fuzzy Hash: 53E1B072E0A64692EB688E25815013D33A0FF45BD8F244235DA6E07794FF3DEC5AC768
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 254a1a10cbcd3fc84fc19bba0395498d0da72a100f68aacced460330d578e86f
                          • Instruction ID: 184c9a8fd5ea98e1537e19cc633a410fc6eb720559583607a40148ccf3a74c02
                          • Opcode Fuzzy Hash: 254a1a10cbcd3fc84fc19bba0395498d0da72a100f68aacced460330d578e86f
                          • Instruction Fuzzy Hash: 22122B52F7179C06DE19C1720AA57B940C69FB67E9F64BB2AEC0B26BE0C90E50834080
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 025840569efbb7ca59604f290f3f0866a02257695ef04c215d1ca961cc9869d8
                          • Instruction ID: 377fb597e8a0b97074289f3243d2fa9e7f1f777ae088c7575826c8f6dbce25df
                          • Opcode Fuzzy Hash: 025840569efbb7ca59604f290f3f0866a02257695ef04c215d1ca961cc9869d8
                          • Instruction Fuzzy Hash: D6F12B52F716DC06DE19C1720AA17B540C68FB67EAF64BB3AEC1B26BE0C90E50834080
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 46cc98b370ef317c212021ce871447dc56b68f2ce3ebb8c804f705b78cb827fb
                          • Instruction ID: a9214676bee5a66c6833d4d299e7c91c2f1db6b7c4e15373cc86b540a2102b6b
                          • Opcode Fuzzy Hash: 46cc98b370ef317c212021ce871447dc56b68f2ce3ebb8c804f705b78cb827fb
                          • Instruction Fuzzy Hash: 2DE11A52F7179C06DE19C5720AB67B941C65FB6BE9F64B73AEC0B26BE0C91E50834080
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1f47f92477a6ad2c451ff91c81c6485ed251fe0b6261cd8c341cf4be0b0e3569
                          • Instruction ID: 179a0a31a9d254616ff32062bb0308cd0058ffe01d9612b3c59718d64801a657
                          • Opcode Fuzzy Hash: 1f47f92477a6ad2c451ff91c81c6485ed251fe0b6261cd8c341cf4be0b0e3569
                          • Instruction Fuzzy Hash: E6E13B52F7579C06EE59C1720AB57B941C69FB67E9F64B73AEC0B26BE0CD0E64834080
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2365863be8a35f4b77e42b0d4c9fe043bac78b607dd1fba0696bd7886c2b0128
                          • Instruction ID: fdf6922dacac4cf88785ed3575616d0d6500c49d2a88987b25988656a58423af
                          • Opcode Fuzzy Hash: 2365863be8a35f4b77e42b0d4c9fe043bac78b607dd1fba0696bd7886c2b0128
                          • Instruction Fuzzy Hash: C5D12B52F7579C06DE59C1720AA17F940C64FBA7EAF65F73AEC0A26BE0DD1E54834080
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 3215553584-0
                          • Opcode ID: 98797a4ed6df2b2ef2fed60eba7a143dae38721ca92eafd97d56f774b5dbee5b
                          • Instruction ID: 0ead77d26432cc2075083c3c18afb4856c402fa0e389aa9a6b7fb8b334904b94
                          • Opcode Fuzzy Hash: 98797a4ed6df2b2ef2fed60eba7a143dae38721ca92eafd97d56f774b5dbee5b
                          • Instruction Fuzzy Hash: 1B71B132A06A5192EBE4CE29D09037D2760FB84BE8F548636DE7E97785CF3CD8498714
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1e1f6b4a43a47bb9831b0098da5e1ac702c1f288b16917b1ac7025f62dd2bd2a
                          • Instruction ID: 22740f56858d42c164dc35c7178055dd646764e07a87c66de0d70ec7a083ff1f
                          • Opcode Fuzzy Hash: 1e1f6b4a43a47bb9831b0098da5e1ac702c1f288b16917b1ac7025f62dd2bd2a
                          • Instruction Fuzzy Hash: 9551D672A1965592E734AB29E04023837B0EB48BA8F244131CE6E47794CF3EEC47C758
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 239a3dbec09180cd3c6533b854e040da4f50052b438bebc3e3433ecd8060fee1
                          • Instruction ID: 29ba3b9c7ef877d830ee8c5c36bf8f7f7a71bebc7c7a08f4915a72295bc4b58e
                          • Opcode Fuzzy Hash: 239a3dbec09180cd3c6533b854e040da4f50052b438bebc3e3433ecd8060fee1
                          • Instruction Fuzzy Hash: FD519076E5A65592F7249B29C04023D37A0EF88BA8F244131CE6D077A4DF3AEC57C7A4
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a64cf53254a0f1d5eef6f95b585bb161f43b2b534b7c991779c7be7f0e4b2867
                          • Instruction ID: 4761146650bba5071b373ab535f5d3b57c496dd679602d702fe6cf6eaed54fab
                          • Opcode Fuzzy Hash: a64cf53254a0f1d5eef6f95b585bb161f43b2b534b7c991779c7be7f0e4b2867
                          • Instruction Fuzzy Hash: 5151C877A2A65192EB248B29C04023833B0EF48F98F246139CE9D07794DF3AEC57C754
                          APIs
                          • RegOpenKeyExW.ADVAPI32(?,?,?,?,?,00007FF8A8CC175E,?,?,?,?,00000000,00007FF8A8CBF3FF), ref: 00007FF8A8CC1D85
                          • lstrcpyW.KERNEL32(?,?,?,?,?,00007FF8A8CC175E,?,?,?,?,00000000,00007FF8A8CBF3FF), ref: 00007FF8A8CC1D9D
                          • RegQueryValueExW.ADVAPI32(?,?,?,?,?,00007FF8A8CC175E), ref: 00007FF8A8CC1DD4
                          • RegQueryValueExW.ADVAPI32(?,?,?,?,?,00007FF8A8CC175E), ref: 00007FF8A8CC1E08
                          • RegQueryValueExW.ADVAPI32(?,?,?,?,?,00007FF8A8CC175E), ref: 00007FF8A8CC1E35
                          • RegQueryValueExW.ADVAPI32(?,?,?,?,?,00007FF8A8CC175E), ref: 00007FF8A8CC1E69
                          • RegQueryValueExW.ADVAPI32(?,?,?,?,?,00007FF8A8CC175E), ref: 00007FF8A8CC1E9D
                          • RegQueryValueExW.ADVAPI32(?,?,?,?,?,00007FF8A8CC175E), ref: 00007FF8A8CC1ED1
                          • RegQueryValueExW.ADVAPI32(?,?,?,?,?,00007FF8A8CC175E), ref: 00007FF8A8CC1F05
                            • Part of subcall function 00007FF8A8CB62C0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB62E1
                            • Part of subcall function 00007FF8A8CB6230: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB6251
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CC20E3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: QueryValue$CloseOpenlstrcpy
                          • String ID: AppClass$AppCmdLine$AppCmdLineParameters$AppDesktop$AppDesktopGuid$AppExtX$AppExtY$AppFlags$AppHwnd$AppMaxExtX$AppMaxExtY$AppMaxSX$AppMaxSY$AppModernModulePath$AppModulePath$AppMonGridId$AppSX$AppSY$rcMax$rcNormal
                          • API String ID: 1451147459-536726495
                          • Opcode ID: 0654bf84ef9cdae98a1148eba303275494ca9c93fed917e93d1cc16e7bdd30e3
                          • Instruction ID: ec4cf6b305764ae6fe90e612ab04202cce76d9ae117c2d7872365c2d75c1b3bd
                          • Opcode Fuzzy Hash: 0654bf84ef9cdae98a1148eba303275494ca9c93fed917e93d1cc16e7bdd30e3
                          • Instruction Fuzzy Hash: 55B12672A15A46ADEB10DFA4D4805ED37B0FB4878CF545133DA0D67A18DF38D249CBA8
                          APIs
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BC56
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BC86
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BCC1
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BCFC
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BD25
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BD50
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BE27
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BEFC
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BF27
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BF8A
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7BFDD
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7C010
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7C03A
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7C043
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF8A8D7C04C
                            • Part of subcall function 00007FF8A8D7D730: VerSetConditionMask.KERNEL32 ref: 00007FF8A8D7D77C
                            • Part of subcall function 00007FF8A8D7D730: VerifyVersionInfoW.KERNEL32 ref: 00007FF8A8D7D7A7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Local$Free$Alloc$AddressProc$ConditionInfoMaskVerifyVersion
                          • String ID: D3DKMTEnumAdapters2$D3DKMTEnumAdapters3$D3DKMTQueryAdapterInfo$NVDA$\SystemRoot\system32\$gdi32.dll$nvpowerapi.dll
                          • API String ID: 2279137159-3107539435
                          • Opcode ID: d09d7bbbbed21704cfcfd05ad7500aad5fc57f30abe4b9fb1f51d63267c4621c
                          • Instruction ID: badf60490550ee55bf1833b360c2e4ce1f94afd736381e696b944494b1441b5d
                          • Opcode Fuzzy Hash: d09d7bbbbed21704cfcfd05ad7500aad5fc57f30abe4b9fb1f51d63267c4621c
                          • Instruction Fuzzy Hash: 80D16C25E0AB42AAFB54DB6594543B863A1FF48BC4F444135CE2E57794EF3CE509C328
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Lockit_invalid_parameter_noinfo_noreturnstd::_$CloseLockit::_Lockit::~_MessageSendSetgloballocaleTimeoutstd::locale::_
                          • String ID: GPUs:$ version $2$205.22$Bottom$Displays:$Left$NVIDIA RTX Desktop Manager$Right$Software\NVIDIA Corporation\Global\nView$Software\NVIDIA Corporation\Global\nView\WindowRect$Top$WindowRect$driver version $os: $osTag
                          • API String ID: 3304796370-1363665941
                          • Opcode ID: 0a10524fb1272b94fb291a584150af6e89b44a10d7abaca0b5ee1a8cb5dbf160
                          • Instruction ID: 4cc0b1d93dce1c27cac9642b5287ff5da66027893c522e5b23fd04a81ee28fd6
                          • Opcode Fuzzy Hash: 0a10524fb1272b94fb291a584150af6e89b44a10d7abaca0b5ee1a8cb5dbf160
                          • Instruction Fuzzy Hash: D322F472A0AF8699EB40DF65E4442AD73A1FB84BD8F504231EA8D07BA9DF3CD544CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Process$CloseEnumHandleOpenToken$ActiveBaseConsoleDuplicateModuleModulesNameProcessesSessionValue_invalid_parameter_noinfo_noreturn
                          • String ID: Shell$Software\Microsoft\Windows NT\CurrentVersion\Winlogon$vector too long
                          • API String ID: 1446407951-1940046086
                          • Opcode ID: d41c97a93e5cd1837abc3fa556a7b24cdb74e75b0d1d46294a661ddf68452fbc
                          • Instruction ID: 6c5b78639be7b98621d349e0aa61b5b166fe5434014f37818745742103831981
                          • Opcode Fuzzy Hash: d41c97a93e5cd1837abc3fa556a7b24cdb74e75b0d1d46294a661ddf68452fbc
                          • Instruction Fuzzy Hash: 0861B432B1AB4299EB10DF25E4442AA6360FB847E4F500235EABC43BD8DF7CD549CB54
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Local$AddressAllocErrorFreeLastProc$ConditionInfoMaskVerifyVersion
                          • String ID: $SYSTEM\CurrentControlSet\Control\Class\$SetupDiDestroyDeviceInfoList$SetupDiGetDeviceRegistryPropertyW$Setupapi.dll$nvpowerapi.dll
                          • API String ID: 2449083218-3179659288
                          • Opcode ID: 02c8dde3fe5924209dc4457330f9a847e446b0de7f9d19b382f9770f94c44afa
                          • Instruction ID: 4ec50ec8eafc1c79e071d102b8de1c9b2a7604b812cbae3e9662609fe2b1a309
                          • Opcode Fuzzy Hash: 02c8dde3fe5924209dc4457330f9a847e446b0de7f9d19b382f9770f94c44afa
                          • Instruction Fuzzy Hash: 68516225E0AB82A6EB54AF15A45437AB3A1FF44BC0F444135DA6E03794EF3DE80CC728
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Close$FromOpenQueryStringValue
                          • String ID: %s %i$($/$Name$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VirtualDesktops\Desktops
                          • API String ID: 3244184606-1929885721
                          • Opcode ID: 42ce07bacc996f2a0b40e488a38c559ebfaeae40b50968b79c9771a6caeb96a5
                          • Instruction ID: d8073584b8549411d6de0a095c7ece0f754cd934101a5ea0abcac96f07137e48
                          • Opcode Fuzzy Hash: 42ce07bacc996f2a0b40e488a38c559ebfaeae40b50968b79c9771a6caeb96a5
                          • Instruction Fuzzy Hash: 9AA1E832A1AB8196EB108F15E4403AE77A1FB807E4F505635EAAD07BE9DF7CD448CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseDescriptorFileFreeHandleInitializeLocalSecurity$AllocAllocateCreateDaclEntriesErrorInfoLastMappingMessageRegisterSystemViewWindow
                          • String ID: %s %d$*P$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\SharedData\MemoryManager.cpp$Failed to create shared memory.$Failed to map shared memory.$ShareStaticMemoryWithProcess$WM_TWINVIEW_MESSAGE$nView Shared Static Memory
                          • API String ID: 4050491821-2945676355
                          • Opcode ID: 0eabf86b4f9c0563ede1f35d604741e3d6f97682afb1e2a25f1b518fc43a4976
                          • Instruction ID: 267c14447b13e4bb535e48bce249ced9dfbeb348849fe96516d82439d50df4d7
                          • Opcode Fuzzy Hash: 0eabf86b4f9c0563ede1f35d604741e3d6f97682afb1e2a25f1b518fc43a4976
                          • Instruction Fuzzy Hash: 29515A31A0AB82EAEB909B10E44577A77A0FF887C4F500135DA5D43B95DF7CE909DB28
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Object$Select$CompatibleCreate$Delete$BitmapCapsDeviceFillRectReleaseTransparent
                          • String ID:
                          • API String ID: 2150606713-0
                          • Opcode ID: 3eeffb7ea1d7ba713930cac9c33df51569c5a938b982ee3abfa83870f6aa0162
                          • Instruction ID: 85e2fb8220b64ff6ac8131269e39eae6f4bb249677499d709b1413a69e856234
                          • Opcode Fuzzy Hash: 3eeffb7ea1d7ba713930cac9c33df51569c5a938b982ee3abfa83870f6aa0162
                          • Instruction Fuzzy Hash: 6041B132A09B84DADB54DB26E84426AB3A1FB89BD0F908135DE5E83B14DF3CD449CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$OpenQueryValue
                          • String ID: %s %d$HKLMIsWritable$Software\NVIDIA Corporation\Global\nView$UseHKLM
                          • API String ID: 1607946009-1712912195
                          • Opcode ID: 4ce5f64bb478fbe813d92a17f29c00f581613c9a9e2d477bf8aa4c01efd6f21b
                          • Instruction ID: 406e6b4519ddf41e826f54b32cdba2b1d038e80919cde08955ce59ae61cb3078
                          • Opcode Fuzzy Hash: 4ce5f64bb478fbe813d92a17f29c00f581613c9a9e2d477bf8aa4c01efd6f21b
                          • Instruction Fuzzy Hash: D5412132A1EBC1E9EB518B10E84466AB764FB847D4F400135EA9D03B68DFBCE549CB58
                          APIs
                          • GetLastError.KERNEL32(?,?,00000001,00007FF8A8D41D4F), ref: 00007FF8A8D509DF
                          • FlsGetValue.KERNEL32(?,?,00000001,00007FF8A8D41D4F), ref: 00007FF8A8D509F4
                          • FlsSetValue.KERNEL32(?,?,00000001,00007FF8A8D41D4F), ref: 00007FF8A8D50A15
                          • FlsSetValue.KERNEL32(?,?,00000001,00007FF8A8D41D4F), ref: 00007FF8A8D50A42
                          • FlsSetValue.KERNEL32(?,?,00000001,00007FF8A8D41D4F), ref: 00007FF8A8D50A53
                          • FlsSetValue.KERNEL32(?,?,00000001,00007FF8A8D41D4F), ref: 00007FF8A8D50A64
                          • SetLastError.KERNEL32(?,?,00000001,00007FF8A8D41D4F), ref: 00007FF8A8D50A7F
                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF8A8D41D4F), ref: 00007FF8A8D50AB5
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF8A8D41D4F), ref: 00007FF8A8D50AD4
                            • Part of subcall function 00007FF8A8D534C8: HeapAlloc.KERNEL32(?,?,00000000,00007FF8A8D50A32,?,?,00000001,00007FF8A8D41D4F), ref: 00007FF8A8D5351D
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF8A8D41D4F), ref: 00007FF8A8D50AFC
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF8A8D41D4F), ref: 00007FF8A8D50B0D
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF8A8D41D4F), ref: 00007FF8A8D50B1E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Value$ErrorLast$AllocHeap
                          • String ID:
                          • API String ID: 3386672085-0
                          • Opcode ID: a3531e3ea82991792cad18046f197ecb24d728a8244471baa1fd8bca79443c8c
                          • Instruction ID: 9f3cbae46d2c8aeae8dc5e4e30b90644cc7994728607283de614d5a1ee6d91b7
                          • Opcode Fuzzy Hash: a3531e3ea82991792cad18046f197ecb24d728a8244471baa1fd8bca79443c8c
                          • Instruction Fuzzy Hash: 9D417E20E0F207A2FA6CA732A5551796242DF447F4F14A736D83E076D6DF2CBD498278
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: lstrcpy
                          • String ID: UNKNOWN$WM_ENTERSIZEMOVE$WM_EXITSIZEMOVE$WM_SYSCOMMAND$WM_TWINVIEW$WM_USER
                          • API String ID: 3722407311-3710089543
                          • Opcode ID: 3a13069f937072d0b233660105284a1f22af0e500dca7f2205eb1b936971c12f
                          • Instruction ID: 38e05a1502fb5feb469700580b15801cf633258281258d68bf058c4d2e4ee404
                          • Opcode Fuzzy Hash: 3a13069f937072d0b233660105284a1f22af0e500dca7f2205eb1b936971c12f
                          • Instruction Fuzzy Hash: 7521A566F0A541AFFB888705E4881B86251EF483C0F985036DD5D43794DF2DEB9DC728
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$FileModuleName_get_pgmptr_invalid_parameter_noinfolstrcpy
                          • String ID: ($D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\Util\path.cpp$failed to get exe path$nvw::getFullPathOfCurrentExe
                          • API String ID: 3581601072-1074026266
                          • Opcode ID: 0807b36c267530d9df7e2378552db271fdd22b7871d3b88481bfbf157a8487e1
                          • Instruction ID: 85a2b83b95658630c9c511ead87ab07b3a0a88a62a707bcba221d6c3fb692fac
                          • Opcode Fuzzy Hash: 0807b36c267530d9df7e2378552db271fdd22b7871d3b88481bfbf157a8487e1
                          • Instruction Fuzzy Hash: 5CA1F872A1ABC1A5EF509B64E0487AEA361FB847E4F400331EAAD036D5DF7CD684CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$CloseFromOpenQueryStringValue
                          • String ID: ($/$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VirtualDesktops\Desktops$Wallpaper
                          • API String ID: 4052002362-2978594480
                          • Opcode ID: 2ce0104bf1a96f5c0f871a36efc3f1b261660f05beeda677cdbb4f220b961b9d
                          • Instruction ID: 6e7a13181d22609f97dde4b3fa80636b732ce5684cea87506a13d8f9d44d32f9
                          • Opcode Fuzzy Hash: 2ce0104bf1a96f5c0f871a36efc3f1b261660f05beeda677cdbb4f220b961b9d
                          • Instruction Fuzzy Hash: 6181BF32619B8196EB00CF25E48439EB765FB84BD4F505225EB9D13BA8DF7CD449CB08
                          APIs
                          Strings
                          • hwnd(0x%08x) class(%s) rootOwner(%i) child(%i) pop(%i) vis(%i) cap(%i) thick(%i) max(%i) rect(%i) parent(vis(%i) rect(%i)), xrefs: 00007FF8A8CB7D52
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Rect$ClientEmptyLongWindow$AncestorClassNameParent
                          • String ID: hwnd(0x%08x) class(%s) rootOwner(%i) child(%i) pop(%i) vis(%i) cap(%i) thick(%i) max(%i) rect(%i) parent(vis(%i) rect(%i))
                          • API String ID: 1814797616-3427189458
                          • Opcode ID: 74a99a62fac07763e797a5255ed2ad9a0e80ffb0614fd098865b18a1db196fb4
                          • Instruction ID: f8e47500c843ada67b5d45d879cc622badbaea2a7356081c4c9d7658c1d06cad
                          • Opcode Fuzzy Hash: 74a99a62fac07763e797a5255ed2ad9a0e80ffb0614fd098865b18a1db196fb4
                          • Instruction Fuzzy Hash: B641A232A1A7C59AEB618F26F84039BB7A0FB88B84F544125DE8D13768DF3CD548CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AddressLocalProc$AllocConditionFreeInfoMaskVerifyVersion
                          • String ID: $SetupDiDestroyDeviceInfoList$SetupDiGetDeviceRegistryPropertyW$Setupapi.dll$nvpowerapi.dll
                          • API String ID: 2839898418-2768794592
                          • Opcode ID: e466b1a3ccaa8f0a7b44d2ba616114f3e944395d7b2877b15c498807e896cd86
                          • Instruction ID: a26b1a77dc9f922f935528cae53fe0d6fc226cb2c77f30f541bd1280718f15a4
                          • Opcode Fuzzy Hash: e466b1a3ccaa8f0a7b44d2ba616114f3e944395d7b2877b15c498807e896cd86
                          • Instruction Fuzzy Hash: D4617E32A0BB86A6EB609B15A44037AB3A0FB857D4F544135DEAD03794DF7CE848CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Process$CloseEnumHandleOpenToken$ActiveBaseConsoleDuplicateModuleModulesNameProcessesSessionValue_invalid_parameter_noinfo_noreturn
                          • String ID: Shell$Software\Microsoft\Windows NT\CurrentVersion\Winlogon
                          • API String ID: 1446407951-2454539505
                          • Opcode ID: 5bdaef2c39089f75fa48d7c9970810c087d07c4f83131bfedaa235a0de9c1b38
                          • Instruction ID: 5c4931ea4c5b4f2a3048325ef66caf287233f9aa0ef8c8410308aa07757a1be8
                          • Opcode Fuzzy Hash: 5bdaef2c39089f75fa48d7c9970810c087d07c4f83131bfedaa235a0de9c1b38
                          • Instruction Fuzzy Hash: E341A132A19B4299EB10DF25E8402AA7364FB847D4F544236EAAC43BD8DF3CD549CB94
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: -$:$f$p$p
                          • API String ID: 3215553584-2013873522
                          • Opcode ID: de602ac8ff022a4ff53410ae60c26684bfbecfd39bdf7640684e28d1363bd85f
                          • Instruction ID: 74e7e8d14fdadfd01f38326a28b36d69f2a9fe6c44de7d2bc91d02ca0f426719
                          • Opcode Fuzzy Hash: de602ac8ff022a4ff53410ae60c26684bfbecfd39bdf7640684e28d1363bd85f
                          • Instruction Fuzzy Hash: F1120772E0E143A5FB606B14E4546797B91FB807D8F844135E6E987AC4DF3CE5888F28
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: DisplayConfigGetDeviceInfo$GetDisplayConfigBufferSizes$QueryDisplayConfig$USER32
                          • API String ID: 667068680-4184181968
                          • Opcode ID: a5ef4c67ba11078c2ffa6386fa48faf55aac686a1588f0bdfbb7da647f20ea45
                          • Instruction ID: c8b7e57c0473d6fecc3de1914573c359627dd6342710535ce03ed3396d77f483
                          • Opcode Fuzzy Hash: a5ef4c67ba11078c2ffa6386fa48faf55aac686a1588f0bdfbb7da647f20ea45
                          • Instruction Fuzzy Hash: 17F1B1A2E09B8696EB15CF29D5011B863B0FB18BC8F049231DF9D27656EF38E5D9C314
                          APIs
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CBD954
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CBD9A6
                          • PostMessageW.USER32 ref: 00007FF8A8CBD9D4
                          • PostMessageW.USER32 ref: 00007FF8A8CBD9EF
                            • Part of subcall function 00007FF8A8CB6490: RegSetValueExW.ADVAPI32 ref: 00007FF8A8CB64B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$MessagePost$CreateCurrentOpenUserValue
                          • String ID: Software\NVIDIA Corporation\Global\nView$Software\NVIDIA Corporation\Global\nViewInstalled$nViewAutoRun$nViewNextLoaded
                          • API String ID: 1312661684-972942980
                          • Opcode ID: 34d2d4aa2a79af87c3d557e101fc189e3282beb90fb340c31fd369c6738eb85f
                          • Instruction ID: 8c35bf27f2659482134705f883ae3f5bead773e52c5236d3b81bb1162eb4aadc
                          • Opcode Fuzzy Hash: 34d2d4aa2a79af87c3d557e101fc189e3282beb90fb340c31fd369c6738eb85f
                          • Instruction Fuzzy Hash: D621F831B19982AAEB40DB14E854B793760FFC47C8F900031DA5E47AA8DF3DD508CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Library$AddressCapsDeviceFreeLoadProcRelease
                          • String ID: GetProcessDpiAwareness$Shcore.dll
                          • API String ID: 3122902491-965750929
                          • Opcode ID: 706600f3433ac546de3d44e6b443f49ac883f3d3bb93401094a960212bb2fc61
                          • Instruction ID: 4da99c65fca6808bf2d1985cad08456dc2bd0e1b26e219f46a77dcf76784edcf
                          • Opcode Fuzzy Hash: 706600f3433ac546de3d44e6b443f49ac883f3d3bb93401094a960212bb2fc61
                          • Instruction Fuzzy Hash: 97112121B1AB41DAEF84CB65F4542396291EF88BC4F581038E92E47784DF3DD8488B68
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CriticalSection$Initialize$Leave$EnterFreeLibrary
                          • String ID:
                          • API String ID: 3518392267-0
                          • Opcode ID: 23329b1970a4fbed670d33c2c2c16f4f298de89f17d4aed16765008b6f957f1c
                          • Instruction ID: 04033ce63481738095e9af430b0c802a01fed7f8331934f787e986ace051b956
                          • Opcode Fuzzy Hash: 23329b1970a4fbed670d33c2c2c16f4f298de89f17d4aed16765008b6f957f1c
                          • Instruction Fuzzy Hash: 7B41D530D1EA42FAFB809B14E944A743BA0FF553E4F440175C56E831A4DFACA98CE768
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Current$DebugOutputProcessStringThread
                          • String ID: (%s %i)$%s pid(%4i) tid(%4i) %s %s: $%s: $too many errors. stop logging.
                          • API String ID: 3523908995-4188371919
                          • Opcode ID: 789ea09124d90c572695d1e0560efe53fe52e707d1d61b1f47458974b972e9fb
                          • Instruction ID: 9e92fc397556a0aeaea3e69f003b98c8b639388b17ed431fe9813c20b340e159
                          • Opcode Fuzzy Hash: 789ea09124d90c572695d1e0560efe53fe52e707d1d61b1f47458974b972e9fb
                          • Instruction Fuzzy Hash: 5B91B87190AA81A9EB60DB25F8542B9A790FF447E0F400235DBAD437D5CF3CE655CB28
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Window$LibraryLongPlacementRect$AddressCapsDeviceFreeIntersectLoadProcRelease
                          • String ID: ,
                          • API String ID: 2005805011-3772416878
                          • Opcode ID: 660f546e11f01d5dfa67f53dfc8e9d6175266f92e32ce8678adf1d1f452e2d29
                          • Instruction ID: 519201ea64882629ab72907cc472c908e97d9086d357a2816e2e06c86724878e
                          • Opcode Fuzzy Hash: 660f546e11f01d5dfa67f53dfc8e9d6175266f92e32ce8678adf1d1f452e2d29
                          • Instruction Fuzzy Hash: 2C61F932E09B819AE7518F39E4442AEB7A1FB88794F205235EE9D17744EF7CE584CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseEnumOpen$CreateCurrentInfoQueryUser
                          • String ID: Software\NVIDIA Corporation\Global\nViewProcessManager$Software\NVIDIA Corporation\Global\nViewProcessManager2
                          • API String ID: 2001131864-127678552
                          • Opcode ID: 7b294276fc46c88e70f61d5719670a729c6265e142775c619417be7f350a3769
                          • Instruction ID: 550aa8d7183c66ba2a95d71e35f38f9110ef5562232ca1757d9329691f9d9881
                          • Opcode Fuzzy Hash: 7b294276fc46c88e70f61d5719670a729c6265e142775c619417be7f350a3769
                          • Instruction Fuzzy Hash: A7517C32609B82D6EB60DB25F4846AAB7A4FB947C0F444136EACD57B68DF3CE105CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 6436c2138278e838b4396a275288fcfbc5b678e40a56344861f9511c4cfbaea8
                          • Instruction ID: 4f14fd3407f2608c125bd17bd8ada648404e31c64a6461163188f6623000e9c1
                          • Opcode Fuzzy Hash: 6436c2138278e838b4396a275288fcfbc5b678e40a56344861f9511c4cfbaea8
                          • Instruction Fuzzy Hash: E241E371B1BA02A5FB59CB16A8005756391FF45BE0F09513ADD2D47B94EF3CE809C368
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CurrentFile$AttributesCreateProcessThread_invalid_parameter_noinfo_noreturn
                          • String ID: $D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\API\ProfileFile.cpp$Failed to open file '%s' for writing$ProfileFileWrite::openNewFile
                          • API String ID: 1995869482-3952071732
                          • Opcode ID: adf3f9b23121c511c22c211d77254a129a135611c9d57d9d8b626fdb97062c3f
                          • Instruction ID: 5aec6e99bbe01fff547fda6280632f5908b94bc0443194dece076142d59ac4fd
                          • Opcode Fuzzy Hash: adf3f9b23121c511c22c211d77254a129a135611c9d57d9d8b626fdb97062c3f
                          • Instruction Fuzzy Hash: E141E271A0A68166FB409B15E55577E6361EF817E4F104230EA6C07BD5CF7CE4068B28
                          APIs
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • RegCreateKeyExW.ADVAPI32 ref: 00007FF8A8D74BC8
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8D74CC0
                            • Part of subcall function 00007FF8A8CB6550: RegSetValueExW.ADVAPI32(?,?,?,?,?,?,00007FF8A8CB5AE9), ref: 00007FF8A8CB65A7
                            • Part of subcall function 00007FF8A8CB6490: RegSetValueExW.ADVAPI32 ref: 00007FF8A8CB64B4
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8D74CA5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$CreateValue$CurrentOpenUser
                          • String ID: ?$PerMonStyle_%d$Software\NVIDIA Corporation\Global\nView$WallpaperMonitor_%d
                          • API String ID: 2653171412-2786258887
                          • Opcode ID: 8f9e0d4a2b6a552a92d766a733559e64174b30bd28b07efa85844675e8692d14
                          • Instruction ID: 61fc22853ce1b32215255e579093a0ae2d2d8cf49ffe5459abd67b3179a5e1f4
                          • Opcode Fuzzy Hash: 8f9e0d4a2b6a552a92d766a733559e64174b30bd28b07efa85844675e8692d14
                          • Instruction Fuzzy Hash: 91415B32A18BC196E7209B55E4403AAB761FB98784F405226EBDD03A59DF7CE195CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseProcess$Handle$CreateCurrentObjectOpenQuerySingleValueWaitWow64
                          • String ID: %s\%s %s$h$nViewMain64.exe
                          • API String ID: 563726375-2808350667
                          • Opcode ID: 454a5909347dd663a7aff94882edc13ab49f069e81745075fcd0f01081e62d5a
                          • Instruction ID: 676d7ef9ec2949e4cc9f53f394ca827cccf465da4488a4d6407cde20180da3d5
                          • Opcode Fuzzy Hash: 454a5909347dd663a7aff94882edc13ab49f069e81745075fcd0f01081e62d5a
                          • Instruction Fuzzy Hash: EF313022919BC196E760CB20E8413ABB3A1FBD9384F505236DADD43A5ADF7CD154CF10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Create$CloseCopyTree
                          • String ID: ?$Grids$GridsV2
                          • API String ID: 911674296-1100836597
                          • Opcode ID: 8242656abf85630504918514ed6c65260a5c7369cfd24a60d8ce36a98baa9620
                          • Instruction ID: 3dfbe59236facca4b7978057566c57b29481a3af6dda91ce1abb4b825d8455e0
                          • Opcode Fuzzy Hash: 8242656abf85630504918514ed6c65260a5c7369cfd24a60d8ce36a98baa9620
                          • Instruction Fuzzy Hash: 46212532A09B41DAEB108F15F48496AB7E9FB887C4F200136EA9D03A28DF3CD945CF44
                          APIs
                          • WaitForSingleObject.KERNEL32(?,?,?,?,00000000,00007FF8A8CB75F7), ref: 00007FF8A8CB8C8D
                            • Part of subcall function 00007FF8A8CB7E10: GetCurrentThreadId.KERNEL32 ref: 00007FF8A8CB7ECD
                            • Part of subcall function 00007FF8A8CB7E10: GetCurrentProcessId.KERNEL32 ref: 00007FF8A8CB7ED5
                          • WaitForSingleObject.KERNEL32(?,?,?,?,00000000,00007FF8A8CB75F7), ref: 00007FF8A8CB8CBE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CurrentObjectSingleWait$ProcessThread
                          • String ID: D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\Util\Mutex.h$Wait for mutex failed$nview::Mutex::lock$nview::Mutex::trylock$r
                          • API String ID: 2624563993-601681855
                          • Opcode ID: 9ce0c794f429f25fc0fb8f9da2e64e5ccdb6a5976d83a5c9f55b032f95f98bd7
                          • Instruction ID: 38bcf75be9852f2aec1a4946b32d683401a46b065c3a110ec7c0a4d737a04008
                          • Opcode Fuzzy Hash: 9ce0c794f429f25fc0fb8f9da2e64e5ccdb6a5976d83a5c9f55b032f95f98bd7
                          • Instruction Fuzzy Hash: 0111D021A0EA42ADFB909F20E4442B6A2A0EF447C4F244135D99D43795DF3CEA59CB68
                          APIs
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                            • Part of subcall function 00007FF8A8CB6060: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,00007FF8A8CB240F), ref: 00007FF8A8CB60A6
                            • Part of subcall function 00007FF8A8CB6060: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,00007FF8A8CB240F), ref: 00007FF8A8CB60EA
                            • Part of subcall function 00007FF8A8CB6060: RegCopyTreeW.ADVAPI32 ref: 00007FF8A8CB6107
                            • Part of subcall function 00007FF8A8CB6060: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00007FF8A8CB240F), ref: 00007FF8A8CB6117
                          • RegDeleteValueW.ADVAPI32 ref: 00007FF8A8CB2421
                          • RegDeleteValueW.ADVAPI32 ref: 00007FF8A8CB2431
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CB243A
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CB2445
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$Create$DeleteValue$CopyCurrentOpenTreeUser
                          • String ID: GridMax$GridSendTo$Software\NVIDIA Corporation\Global\nView
                          • API String ID: 120012242-3019578623
                          • Opcode ID: 0f8bc6068a6a84a6f98ad9173e7465bad165d5f850bd443d259ec9a505a2e002
                          • Instruction ID: 1828291a14cba08109b310837b4edcf12bd0645c35c95ec5492cc6d46417424b
                          • Opcode Fuzzy Hash: 0f8bc6068a6a84a6f98ad9173e7465bad165d5f850bd443d259ec9a505a2e002
                          • Instruction Fuzzy Hash: EE014F24E2AB83A9EB849B11F8546756360FF887C4F542031DA9E07B55EF3CD508CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_$Lockit::~_$Yarn$Concurrency::cancel_current_taskGetctypeLocinfo::_Locinfo_ctorstd::bad_alloc::bad_alloc
                          • String ID: bad locale name
                          • API String ID: 172794362-1405518554
                          • Opcode ID: bdc275e71517e07f7d4623ac278ecfdca2b853a21c36f3fea48557e4e7f0ac48
                          • Instruction ID: abbc3dcc973483dbc065c4cee69ecbb11fcc6aae653522c7cb50de2e23d5031d
                          • Opcode Fuzzy Hash: bdc275e71517e07f7d4623ac278ecfdca2b853a21c36f3fea48557e4e7f0ac48
                          • Instruction Fuzzy Hash: 4551B6A2E0B69261FFE4EB55D4402796260EF85BC0F484031EB5D47B95EF2CE855CB24
                          APIs
                          • RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8CA44C5), ref: 00007FF8A8CA451F
                            • Part of subcall function 00007FF8A8CB61F0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB621E
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8CA44C5), ref: 00007FF8A8CA4672
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: GridCount$R%d$rcMonitorX$rcMonitorY
                          • API String ID: 3677997916-3195266059
                          • Opcode ID: d4954fe01bd13cc0e09b9bb97f1a492d31920e10008184fdca9963bf8f21c4a9
                          • Instruction ID: b4dba1b89e235386a6913daabc5b95ab1de89eb67e3d45c0021e636e89a82904
                          • Opcode Fuzzy Hash: d4954fe01bd13cc0e09b9bb97f1a492d31920e10008184fdca9963bf8f21c4a9
                          • Instruction Fuzzy Hash: 0B51F532A1E691A6DB909B55E48017EB7E1FBC47C0F405036EA8E47B45DF3CE410CB64
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Open$Close$CurrentQueryUserValue
                          • String ID:
                          • API String ID: 384383028-0
                          • Opcode ID: 604bbfb0ae1169e5cea77c79d2654ac51a876ae21c04f2b2698c331749a0c9d9
                          • Instruction ID: 0d85b9c6cca3a024670243845aae8ce2b9e892150c134a082095a0d2c37142ea
                          • Opcode Fuzzy Hash: 604bbfb0ae1169e5cea77c79d2654ac51a876ae21c04f2b2698c331749a0c9d9
                          • Instruction Fuzzy Hash: 9E31AB72B19B8196EB508B21F44476AF7A1FB887D4F444131EA9E43B68DF7CC458CB08
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Value$CloseCreateDelete
                          • String ID: GridCount$R%d$rcMonitorX$rcMonitorY
                          • API String ID: 2667537340-3195266059
                          • Opcode ID: 1b6452b51fff453e52569022fb88f30feba7a2f2517d8edb8d3446fa00748f7c
                          • Instruction ID: 982d6f6d16dac277a42b2e582737c3d0015c101ea3213fdc063158f8a0e94f98
                          • Opcode Fuzzy Hash: 1b6452b51fff453e52569022fb88f30feba7a2f2517d8edb8d3446fa00748f7c
                          • Instruction Fuzzy Hash: 1F31D322A29A81AAD7509F22E4404AEB761FF88BC4F405036EB8D47B55DF3CE455CF18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: EventLogging$Instance%d$Software\NVIDIA Corporation\Global\NVTweak
                          • API String ID: 3677997916-3972124742
                          • Opcode ID: 14f82b084d9406ec83bc3ae469928ea89765719fae94ef2a9ab279296433f501
                          • Instruction ID: 3c71eaa63930007d96ec9dc89a6ad55bb9976c4f71979e45ff95e2bcc45cb574
                          • Opcode Fuzzy Hash: 14f82b084d9406ec83bc3ae469928ea89765719fae94ef2a9ab279296433f501
                          • Instruction Fuzzy Hash: 01218171A1AA81A6EB509F50F4847AAB3A0FB887C4F401136EB9E07755DF7CD508CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CurrentFile$CreatePointerProcessThread
                          • String ID: $D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\API\ProfileFile.cpp$Failed to open file '%s' for writing$ProfileFileWrite::openWrite
                          • API String ID: 4016602578-1807614754
                          • Opcode ID: 305410ddb6c4d368433189b732900f630b3e319f53562fd789d9ed75bc13f1ff
                          • Instruction ID: 1a1bb6c0f84fc2fc81a8f1f54a5f528703b45faba937d069f6c75badedef826e
                          • Opcode Fuzzy Hash: 305410ddb6c4d368433189b732900f630b3e319f53562fd789d9ed75bc13f1ff
                          • Instruction Fuzzy Hash: E811BF71A0DB5196EB508B51F40476AB760FB84BE8F144230EEAD03B99CF7CD546CB64
                          APIs
                            • Part of subcall function 00007FF8A8CBD460: CreateMutexW.KERNEL32 ref: 00007FF8A8CBD49A
                            • Part of subcall function 00007FF8A8CBD460: GetLastError.KERNEL32 ref: 00007FF8A8CBD4A8
                            • Part of subcall function 00007FF8A8CBD460: WaitForSingleObject.KERNEL32 ref: 00007FF8A8CBD4BD
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CBDA6A
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CBDABD
                            • Part of subcall function 00007FF8A8CB6490: RegSetValueExW.ADVAPI32 ref: 00007FF8A8CB64B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$Create$CurrentErrorLastMutexObjectOpenSingleUserValueWait
                          • String ID: Software\NVIDIA Corporation\Global\nView$Software\NVIDIA Corporation\Global\nViewInstalled$nViewAutoRun$nViewNextLoaded
                          • API String ID: 1572674430-972942980
                          • Opcode ID: 2b53140f13742c1fceefd5b7d1b197221aff8bbbbadfeb63a278f3f936b43a1b
                          • Instruction ID: 8dffd4436c3b05929a6c9441a751338b08ae09a67967ee12c5698c2eb2849ab8
                          • Opcode Fuzzy Hash: 2b53140f13742c1fceefd5b7d1b197221aff8bbbbadfeb63a278f3f936b43a1b
                          • Instruction Fuzzy Hash: 6D119031B1EA43A9EF50EB11E8447B96360FF807C8F544035DA4E47695DF2DEA09CB58
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: ByteCharMultiStringWide
                          • String ID:
                          • API String ID: 2829165498-0
                          • Opcode ID: 7f97a42c04ae3af0475527c7c5bdaeefa5248d1fe9508a59029fdc54d14fd549
                          • Instruction ID: 33b250a2a446d9ea8e9d7be7658c6c85e2012cab7992fb426e4e3eb8d78971e9
                          • Opcode Fuzzy Hash: 7f97a42c04ae3af0475527c7c5bdaeefa5248d1fe9508a59029fdc54d14fd549
                          • Instruction Fuzzy Hash: 2681C632B0A7829AEBA09F51D440379B7A1FB44BE4F140236EA9D57BC8DF7DE4058B14
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                          • String ID:
                          • API String ID: 2081738530-0
                          • Opcode ID: aaa045da2cac1be6bfe98c388d33e62556946d456f580afd11eeb53e29fb882f
                          • Instruction ID: 9962f826a7c035509fdd5130dbe9f5f4fce915f037225b48a5b2b7be6434221e
                          • Opcode Fuzzy Hash: aaa045da2cac1be6bfe98c388d33e62556946d456f580afd11eeb53e29fb882f
                          • Instruction Fuzzy Hash: EB4115A2A0AA81A1EB90CB16E4443B97360FF44FD4F181131DB5D07796CF7DD852CB28
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                          • String ID:
                          • API String ID: 2081738530-0
                          • Opcode ID: 31fcc4e87e9b4dfe4a88678ce32fc077ae695fd1d2d7429288691d9b00b139e1
                          • Instruction ID: 34061b475e212d09451e422be01d99c40782d000028f0f9183ef832a201412a5
                          • Opcode Fuzzy Hash: 31fcc4e87e9b4dfe4a88678ce32fc077ae695fd1d2d7429288691d9b00b139e1
                          • Instruction Fuzzy Hash: 2631C922A0BB82A5EB91AF19E4401B97760FF44BD4F180131DB5D037A5EF7DE895CB28
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                          • String ID:
                          • API String ID: 2081738530-0
                          • Opcode ID: 3df33cfd218dae58aca0b7dbd009118991c141224ecd72cd6384c67695d70698
                          • Instruction ID: 0b29d3cd0a7a082427b4e46147504bce4834c5797a24ac86266ca63ece9bcd52
                          • Opcode Fuzzy Hash: 3df33cfd218dae58aca0b7dbd009118991c141224ecd72cd6384c67695d70698
                          • Instruction Fuzzy Hash: 6D31A022A0BB42A5EB859B19E4401B9B3A1FF44BD4F180132DB5D437D5DF7CE896CB28
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                          • String ID:
                          • API String ID: 2081738530-0
                          • Opcode ID: 93c072d69f4b3f14cea9f6a99c890add5073e0393d7ab09c251616810e8cd7a1
                          • Instruction ID: d63ac0cce51632ab0343ce26268cabe1b668efdc7b6c287739edc828034627d9
                          • Opcode Fuzzy Hash: 93c072d69f4b3f14cea9f6a99c890add5073e0393d7ab09c251616810e8cd7a1
                          • Instruction Fuzzy Hash: AB31A621A0BA82A1FB91AF19E4401B97760FF44BD0F184135EB5D07795EF7CE896CB28
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                          • String ID:
                          • API String ID: 2081738530-0
                          • Opcode ID: 191aea12410133a0f2faa5e7d846d4004bcb4f006e9f7b9a357926b101382c5b
                          • Instruction ID: c51135a09cdbafbfa0896bc163cc6713bde430787f3bb9a6f7dd630c7cb9efd9
                          • Opcode Fuzzy Hash: 191aea12410133a0f2faa5e7d846d4004bcb4f006e9f7b9a357926b101382c5b
                          • Instruction Fuzzy Hash: C031B721A0BA81A1EB95AB19E4401F97361FF84BD0F180131DB5D077E5EF7DE895CB28
                          APIs
                          • SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC638C
                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC639E
                          • SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63BC
                          • ReadFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63E8
                          • lstrcmpW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC63FA
                          • SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A8CC64E8,?,00007FF8A8CC6854), ref: 00007FF8A8CC6422
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: File$Pointer$Readlstrcmplstrlen
                          • String ID:
                          • API String ID: 3180310406-0
                          • Opcode ID: b269bcbd899f41cc2c559b6ae3b2ed03acf68413e74c9681a513b2d9f466a788
                          • Instruction ID: c08d6a39eeac125a64f7f940ffe915aeabca43fc8d3b10d0fc3b2ebc571b41ce
                          • Opcode Fuzzy Hash: b269bcbd899f41cc2c559b6ae3b2ed03acf68413e74c9681a513b2d9f466a788
                          • Instruction Fuzzy Hash: 40318F32A29B41DAE750CF25F85096AB7A0FB88B84F541135EE5E43B14DF3CD806CB14
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e621a83d898fdc62b8420afce1d9488eaca21ed5a488aef6206f0d2b8da9a0fb
                          • Instruction ID: 3a33559506926ec46f6aca80164b06deb0262b02804c0c8e4aa5e2e787601282
                          • Opcode Fuzzy Hash: e621a83d898fdc62b8420afce1d9488eaca21ed5a488aef6206f0d2b8da9a0fb
                          • Instruction Fuzzy Hash: C8214A36B05690CFC314CF6AE548829B7A4F788B94B198128DF6A03B14DF39E849CF04
                          APIs
                          • GetLastError.KERNEL32(?,?,00000001,00007FF8A8D42C15,?,?,?,?,00007FF8A8D5352F,?,?,00000000,00007FF8A8D50A32,?,?,00000001), ref: 00007FF8A8D50B57
                          • FlsSetValue.KERNEL32(?,?,00000001,00007FF8A8D42C15,?,?,?,?,00007FF8A8D5352F,?,?,00000000,00007FF8A8D50A32,?,?,00000001), ref: 00007FF8A8D50B8D
                          • FlsSetValue.KERNEL32(?,?,00000001,00007FF8A8D42C15,?,?,?,?,00007FF8A8D5352F,?,?,00000000,00007FF8A8D50A32,?,?,00000001), ref: 00007FF8A8D50BBA
                          • FlsSetValue.KERNEL32(?,?,00000001,00007FF8A8D42C15,?,?,?,?,00007FF8A8D5352F,?,?,00000000,00007FF8A8D50A32,?,?,00000001), ref: 00007FF8A8D50BCB
                          • FlsSetValue.KERNEL32(?,?,00000001,00007FF8A8D42C15,?,?,?,?,00007FF8A8D5352F,?,?,00000000,00007FF8A8D50A32,?,?,00000001), ref: 00007FF8A8D50BDC
                          • SetLastError.KERNEL32(?,?,00000001,00007FF8A8D42C15,?,?,?,?,00007FF8A8D5352F,?,?,00000000,00007FF8A8D50A32,?,?,00000001), ref: 00007FF8A8D50BF7
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 68d398513a1def8f4f23a79826c846c6c895763bd2f77bc20ffaee47644bb02d
                          • Instruction ID: 17e99c3645ee07123b0cc5225d800ae07c5797d5454f00db8be3be5de18529a5
                          • Opcode Fuzzy Hash: 68d398513a1def8f4f23a79826c846c6c895763bd2f77bc20ffaee47644bb02d
                          • Instruction Fuzzy Hash: C3118120E0F242A2FA5CA721A68117D6252EF447F4F145736D93E077E6DF2CBD098628
                          APIs
                            • Part of subcall function 00007FF8A8CB5CF0: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5D38
                            • Part of subcall function 00007FF8A8CB5CF0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB5D7E
                            • Part of subcall function 00007FF8A8CB5CF0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB5DD4
                            • Part of subcall function 00007FF8A8CB5CF0: RegCloseKey.ADVAPI32 ref: 00007FF8A8CB5DDF
                            • Part of subcall function 00007FF8A8CB5CF0: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5E22
                            • Part of subcall function 00007FF8A8CB5CF0: RegCloseKey.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5E31
                          • RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB5FDC
                          • RegOpenKeyExW.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB5FFD
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB600A
                          • RegOpenKeyExW.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB602B
                          • SHDeleteKeyW.SHLWAPI(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB603F
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB604C
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Open$Close$QueryValue$CurrentDeleteUser
                          • String ID:
                          • API String ID: 2172608312-0
                          • Opcode ID: aace1ffcfe82ca35d18ad0bd785af98a7a8fc6f6eed0015624ece145ff39fa5c
                          • Instruction ID: 12cd04acf210a5de77a9687add8fea917d8e4dc2196141dd4f2190db681ea399
                          • Opcode Fuzzy Hash: aace1ffcfe82ca35d18ad0bd785af98a7a8fc6f6eed0015624ece145ff39fa5c
                          • Instruction Fuzzy Hash: D3111F25B09B8296DB509B51F48453AE361FB88BD0F504031DE9E47B15DFACD588CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task
                          • String ID: false$true
                          • API String ID: 118556049-2658103896
                          • Opcode ID: 14bcb6fc04d6207312ac0b71193f476d97310ba2fc694dbaca6b0e73206cd48f
                          • Instruction ID: 20858e8c1f333ad5400ce92e893da7ffbf5a5a9c28b683883fca792d81c80fd8
                          • Opcode Fuzzy Hash: 14bcb6fc04d6207312ac0b71193f476d97310ba2fc694dbaca6b0e73206cd48f
                          • Instruction Fuzzy Hash: 6091DD22B0AB46A9E790DFA0D4402EE73A6FB48788F454235DE4C97B89EF38D506C754
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Value$CloseEnumOpenQuery
                          • String ID: Disable_
                          • API String ID: 2924656870-3431196049
                          • Opcode ID: 909549ab4e45b6006d3222f2beee845314a71683d74e0daf326a2a6027938a8b
                          • Instruction ID: 629cc16062705224a49c661c7f3605bbe4638e398df1885c43818f7b05c0f3ed
                          • Opcode Fuzzy Hash: 909549ab4e45b6006d3222f2beee845314a71683d74e0daf326a2a6027938a8b
                          • Instruction Fuzzy Hash: 23715D72A09B819AE7909F26E4402AEB7B4FB84788F108135DB8D43B54DF7CD559CF18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$GetctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
                          • String ID: bad locale name
                          • API String ID: 2967684691-1405518554
                          • Opcode ID: fde50bd610958431825e2a078f41d58f222eb4958fcd7f20b5888122aabb0c78
                          • Instruction ID: 4060f0a8687483a28c129f3122bec366bf0ad7ca69d984c7d6969d3a2679d2dd
                          • Opcode Fuzzy Hash: fde50bd610958431825e2a078f41d58f222eb4958fcd7f20b5888122aabb0c78
                          • Instruction Fuzzy Hash: CD517922F0AB81AAFB90DBB4D4402AC33B5EF44788F044135DE4D67A56DF38E566C728
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcVersion
                          • String ID: RtlGetVersion$ntdll
                          • API String ID: 3310240892-2582309562
                          • Opcode ID: 7606234e096adcee02d3d9db7c79f1b1fc690830e42571d938679808d679138d
                          • Instruction ID: 62b11f591ad116c3729703ed3d1d0cb87c0b8d0e15248aa7fd2188ff64b26f10
                          • Opcode Fuzzy Hash: 7606234e096adcee02d3d9db7c79f1b1fc690830e42571d938679808d679138d
                          • Instruction Fuzzy Hash: AC412C30E1FA42AEFBA49B11E944A792291FF94384F244035C55D476A4EF3EEA059F28
                          APIs
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • RegOpenKeyExW.ADVAPI32 ref: 00007FF8A8D741E1
                            • Part of subcall function 00007FF8A8CB6460: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,00007FF8A8CB5A69,?,?,?,00007FF8A8C9ECCB), ref: 00007FF8A8CB647E
                            • Part of subcall function 00007FF8A8CB6230: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB6251
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8D742B6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue$CreateCurrentUser
                          • String ID: PerMonStyle_%d$Software\NVIDIA Corporation\Global\nView$WallpaperMonitor_%d
                          • API String ID: 2701862898-827817195
                          • Opcode ID: ff8e354f6e612cc0906d5e112b6d01ad4878d23f19bb0e7e533dffe9b0d26fc7
                          • Instruction ID: c1a9725aa766d3056fb9bfe39a1960ac46e38183249bffb1573d8b86378cdc5b
                          • Opcode Fuzzy Hash: ff8e354f6e612cc0906d5e112b6d01ad4878d23f19bb0e7e533dffe9b0d26fc7
                          • Instruction Fuzzy Hash: 5831B032A1CBC196E760DB51E4407AAB721FBD4784F40A236EA9D13A5ADF3CD195CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CreateMutex
                          • String ID: D$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\Util\Mutex.h$Failed to create mutex$nview::Mutex::Mutex
                          • API String ID: 1964310414-228551020
                          • Opcode ID: 86ef1e6394c7cc23edfa395c26d2ce74e5e240e78efc1bafd39f6a409eaf6ea6
                          • Instruction ID: 88401ad88fe0ff8ffe7340caddf842c420ab663434aeeac390a53063e782f6c3
                          • Opcode Fuzzy Hash: 86ef1e6394c7cc23edfa395c26d2ce74e5e240e78efc1bafd39f6a409eaf6ea6
                          • Instruction Fuzzy Hash: BD318D2192FA83A9FB90DB10E8552B52260EF503C4F500135DA6E072A5DF7DEA18DB3C
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Current$CreateFileProcessThread
                          • String ID: 7$Could not open profile %s$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\API\ProfileFile.cpp$ProfileFileRead::openRead
                          • API String ID: 1525889721-2400873262
                          • Opcode ID: 9df9c287fd88bad9c7fe4c31f064e24d82a4eb7d5520a88877bcfdb4258701d7
                          • Instruction ID: bd6b458e6a6967becfef31ad4b927c734b25d4e0869d65b022b5e884a2c54628
                          • Opcode Fuzzy Hash: 9df9c287fd88bad9c7fe4c31f064e24d82a4eb7d5520a88877bcfdb4258701d7
                          • Instruction Fuzzy Hash: 3F21F8B2A04642A7D7449B10E6513EAA361FB443F4F108234DBAE43B84DF7DD565C754
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: ObjectSingleWait
                          • String ID: D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\SharedData\MemoryManager.cpp$Shared heap mutex timeout$invalid address outside of shared memory$sfree
                          • API String ID: 24740636-2021786884
                          • Opcode ID: 8ef93e81ad967d30e829dbee4454a5c71a4eeb268b27e0fb83865f20633639ef
                          • Instruction ID: ca597f32c6b3fc8f2c44e25a39d913e93c5c9b7a2eaf318c31764d2ecd0fdb3c
                          • Opcode Fuzzy Hash: 8ef93e81ad967d30e829dbee4454a5c71a4eeb268b27e0fb83865f20633639ef
                          • Instruction Fuzzy Hash: 3C319131E1BA42A9FB009B51E8852B97761FF847D8F000532D96D4B3A5DF7CE588C768
                          APIs
                          • GetWindowThreadProcessId.USER32 ref: 00007FF8A8C9EC3D
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • RegOpenKeyExW.ADVAPI32 ref: 00007FF8A8C9ECA9
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8C9ECD4
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8C9ECDF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$Open$CreateCurrentProcessThreadUserWindow
                          • String ID: Software\NVIDIA Corporation\Global\nViewProcessManager
                          • API String ID: 4232168507-2446852373
                          • Opcode ID: 4037a16beeaf4b5f9be2a60a613236d17183851f441de9a9c2356edaacf4e608
                          • Instruction ID: 86204936d16db182e706ecd76be41786c1c84f6c804a3634eac1289a4aae3043
                          • Opcode Fuzzy Hash: 4037a16beeaf4b5f9be2a60a613236d17183851f441de9a9c2356edaacf4e608
                          • Instruction Fuzzy Hash: AF216D32A2EA81DAEB909F55F48466AB361FB947C0F505031EA8E47A19DF7CD908CF14
                          APIs
                          • RegOpenKeyExW.ADVAPI32(?,?,?,?,00000000,00007FF8A8D94FF9,?,?,?,00007FF8A8D954F7), ref: 00007FF8A8D9504A
                          • RegOpenKeyExW.ADVAPI32(?,?,?,?,00000000,00007FF8A8D94FF9,?,?,?,00007FF8A8D954F7), ref: 00007FF8A8D95076
                          • RegCloseKey.ADVAPI32(?,?,?,?,00000000,00007FF8A8D94FF9,?,?,?,00007FF8A8D954F7), ref: 00007FF8A8D950BC
                          • RegCloseKey.ADVAPI32(?,?,?,?,00000000,00007FF8A8D94FF9,?,?,?,00007FF8A8D954F7), ref: 00007FF8A8D950CC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpen
                          • String ID: Software\NVIDIA Corporation\Global\nView\Hotkeys
                          • API String ID: 47109696-933791221
                          • Opcode ID: f63b20d92c62277d19e4c070ed24d08e639ec9124b2f51714c2a0963f8e52db0
                          • Instruction ID: fd1a1152fdf879ac4687e725bd72ce7b83b6a8a79e9603f98cabb837f169af4a
                          • Opcode Fuzzy Hash: f63b20d92c62277d19e4c070ed24d08e639ec9124b2f51714c2a0963f8e52db0
                          • Instruction Fuzzy Hash: 92118E35A09B42E5EA108F55F48056AB370FB887D4F504635EAAD13F68CF7DD059CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseFileHandleMappingOpen
                          • String ID: %s %d$*P$nView Shared Memory
                          • API String ID: 890169576-673546495
                          • Opcode ID: 6687ec36b3b96fc96f6e99804bb1c58a7ae370612d08be84a3efe426ee0ca8dc
                          • Instruction ID: c33a006d45197e4adf0e8eca5777de4ae026331b8309cbe89c72308d867b9392
                          • Opcode Fuzzy Hash: 6687ec36b3b96fc96f6e99804bb1c58a7ae370612d08be84a3efe426ee0ca8dc
                          • Instruction Fuzzy Hash: 27017125E2AA81A6FBA0EB10E4593BA6351FFC4784FC04035D65D03695DF7CD509CE24
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID:
                          • API String ID: 2962429428-0
                          • Opcode ID: 1aed665e9eb4aa794808f3831bcd390f054676b97569a200ea7ffddb8dc9e0f3
                          • Instruction ID: 589e4d0aa29418ef8c124f6b40bd673a3f700b44147b4b1fcb8c7da93262a124
                          • Opcode Fuzzy Hash: 1aed665e9eb4aa794808f3831bcd390f054676b97569a200ea7ffddb8dc9e0f3
                          • Instruction Fuzzy Hash: C0014264D9AB86A9E6009F11FC544246BA4FF89789F141435C87EC32A0DFBDA95CE228
                          APIs
                          • WaitForSingleObject.KERNEL32 ref: 00007FF8A8C9EBBD
                            • Part of subcall function 00007FF8A8CB5FB0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB5FDC
                            • Part of subcall function 00007FF8A8CB5FB0: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB5FFD
                            • Part of subcall function 00007FF8A8CB5FB0: RegCloseKey.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB600A
                            • Part of subcall function 00007FF8A8CB5FB0: SHDeleteKeyW.SHLWAPI(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB603F
                            • Part of subcall function 00007FF8A8CB5FB0: RegCloseKey.ADVAPI32(?,?,?,?,?,00007FF8A8C9EBDA), ref: 00007FF8A8CB604C
                            • Part of subcall function 00007FF8A8CB7A30: FormatMessageW.KERNEL32 ref: 00007FF8A8CB7A78
                            • Part of subcall function 00007FF8A8CB7A30: LocalFree.KERNEL32 ref: 00007FF8A8CB7AB9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpen$CurrentDeleteFormatFreeLocalMessageObjectSingleUserWait
                          • String ID: AttachedProcList::destroy$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\SharedData\ProcessManager.cpp$Software\NVIDIA Corporation\Global$nViewProcessManager
                          • API String ID: 1487693931-125258782
                          • Opcode ID: b2d8a035a8def4797d838e0e3fc5501bc9b98a311eb2ff8e202647f0948e6238
                          • Instruction ID: d1ee305a55d9ed1a61285e59afd81ffacfaa1a48e387b36486fc63340f215787
                          • Opcode Fuzzy Hash: b2d8a035a8def4797d838e0e3fc5501bc9b98a311eb2ff8e202647f0948e6238
                          • Instruction Fuzzy Hash: 77F01C64E1B902FAEB94AB2198894B523A5EF543C4FC15431C41D87151EF2CEA09D768
                          APIs
                          • ReleaseMutex.KERNEL32(?,?,?,?,?,?,00007FF8A8CB80FE), ref: 00007FF8A8CB8D40
                            • Part of subcall function 00007FF8A8CB7E10: GetCurrentThreadId.KERNEL32 ref: 00007FF8A8CB7ECD
                            • Part of subcall function 00007FF8A8CB7E10: GetCurrentProcessId.KERNEL32 ref: 00007FF8A8CB7ED5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Current$MutexProcessReleaseThread
                          • String ID: Could not release mutex$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\Util\Mutex.h$b$nview::Mutex::unlock
                          • API String ID: 1175660520-2035414713
                          • Opcode ID: 247847ec6bec13bd755c655df726135e9c7d3cb5011354b94b451294b0fb55b8
                          • Instruction ID: ce2fc9cd94a5891ffb55c7c04288214b5d833a7ff655c459016061c4bedd29cc
                          • Opcode Fuzzy Hash: 247847ec6bec13bd755c655df726135e9c7d3cb5011354b94b451294b0fb55b8
                          • Instruction Fuzzy Hash: 7DF0A028A0BE83ADEB509B20D4152A463A0FB547C4F604136D98D03761EF3CD61AC768
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: EnumWindowWindows$ProcessThread_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2380886532-0
                          • Opcode ID: 6ef7f4c5644065c8099446e03d570a92efbe140d2d783b9e6a2352544206bbc8
                          • Instruction ID: d214679564ee0d5163fbcc7ff6b9df59bf8002785abe9d9b23d59475470c2810
                          • Opcode Fuzzy Hash: 6ef7f4c5644065c8099446e03d570a92efbe140d2d783b9e6a2352544206bbc8
                          • Instruction Fuzzy Hash: 0F817122A1AE42A2EE509F15E54017DB3A1EB85BD0F185132EE6D13F95EF3CE449C714
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 409342dd066bd9a4ec0295345e693d107baa81c404e4f90e133e73fb9eaf59bf
                          • Instruction ID: a5658007159973ae8c74f194253d904df8a5e055d5d8f4e02f619cbb48695322
                          • Opcode Fuzzy Hash: 409342dd066bd9a4ec0295345e693d107baa81c404e4f90e133e73fb9eaf59bf
                          • Instruction Fuzzy Hash: 3A81291290FA6669F23A8B34A44077A6650FF553D8F146233E97E2F590DF3CE489C628
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Enum$OpenValue
                          • String ID:
                          • API String ID: 3711199431-0
                          • Opcode ID: 620e9999ea12ef3036e1cc8da55f28afb81dd6c53063fec64935eab92801db43
                          • Instruction ID: 1162c88d999fec99273bd1526ea3f98fae95be85c64ed3d1b1a139a1d96eb68a
                          • Opcode Fuzzy Hash: 620e9999ea12ef3036e1cc8da55f28afb81dd6c53063fec64935eab92801db43
                          • Instruction Fuzzy Hash: E651B472619A8196EB50DF25F9407ABA3A0FB847D8F504135EF8D03A98CF7CC549CB08
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,00007FF8A8D3B9C7,?,?,00000000,00007FF8A8D3BD02,?,?,?,?,00000000,00007FF8A8D3BC8E), ref: 00007FF8A8D50C2F
                          • FlsSetValue.KERNEL32(?,?,?,00007FF8A8D3B9C7,?,?,00000000,00007FF8A8D3BD02,?,?,?,?,00000000,00007FF8A8D3BC8E), ref: 00007FF8A8D50C4E
                          • FlsSetValue.KERNEL32(?,?,?,00007FF8A8D3B9C7,?,?,00000000,00007FF8A8D3BD02,?,?,?,?,00000000,00007FF8A8D3BC8E), ref: 00007FF8A8D50C76
                          • FlsSetValue.KERNEL32(?,?,?,00007FF8A8D3B9C7,?,?,00000000,00007FF8A8D3BD02,?,?,?,?,00000000,00007FF8A8D3BC8E), ref: 00007FF8A8D50C87
                          • FlsSetValue.KERNEL32(?,?,?,00007FF8A8D3B9C7,?,?,00000000,00007FF8A8D3BD02,?,?,?,?,00000000,00007FF8A8D3BC8E), ref: 00007FF8A8D50C98
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: be3dc494d5170cfbc0067343573df560e721bb01dd1bc7ed2ebb16866c857ca5
                          • Instruction ID: c697fdf3172e528f2b40fc9d652fac201b170376ae22aa6d2420c8cefb51b6d9
                          • Opcode Fuzzy Hash: be3dc494d5170cfbc0067343573df560e721bb01dd1bc7ed2ebb16866c857ca5
                          • Instruction Fuzzy Hash: E4115120E0F64262FA5CA725A6511796242EF453F0F44A336E83E477D6DF6CFD498228
                          APIs
                          • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB6666
                          • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB668F
                          • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB6697
                          • SetSecurityInfo.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB66C4
                          • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A8CA064B), ref: 00007FF8A8CB66D1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: ErrorLastSecurity$DescriptorFreeInfoLocalSacl
                          • String ID:
                          • API String ID: 770883003-0
                          • Opcode ID: 26d171845e726335711b201ca163724500d896e7f63c1369cf58c7af46724ff1
                          • Instruction ID: 77fab41a6f70b609ab5f910896a69e302ad4839299d72ac230163a9f7aec8442
                          • Opcode Fuzzy Hash: 26d171845e726335711b201ca163724500d896e7f63c1369cf58c7af46724ff1
                          • Instruction Fuzzy Hash: 03117C32A09B829BD7509FA5F44499973A5FB887C4F140135EF9D43B24DF38D949CB18
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: DirectoryLocalSystem$AllocErrorFreeLast
                          • String ID:
                          • API String ID: 3438206570-0
                          • Opcode ID: 3859923cb302e9d23a0ca6cc3a01a2172b2484e24e4966ba5792491c783d4535
                          • Instruction ID: 045c0bb1efd22121838a0bc464469922a44d1ceb9fa47fe657c66445f1d83be7
                          • Opcode Fuzzy Hash: 3859923cb302e9d23a0ca6cc3a01a2172b2484e24e4966ba5792491c783d4535
                          • Instruction Fuzzy Hash: 11F06221F1A6029AEF989B36B85413992D1EF88BC4F585034D92E87354EF3CD889C218
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: FromString_invalid_parameter_noinfo_noreturn
                          • String ID: ($/
                          • API String ID: 4208966878-2468745909
                          • Opcode ID: e86f0ecaa3be94866e7fa5bfc826fc8b204ab50b5608c3affe33a1c089aea301
                          • Instruction ID: b79c763dfcd480852637f656ed2fed1cfaf7dde3fed2b21b4ceccda5c489bc7b
                          • Opcode Fuzzy Hash: e86f0ecaa3be94866e7fa5bfc826fc8b204ab50b5608c3affe33a1c089aea301
                          • Instruction Fuzzy Hash: BE510332A19B81A2EB549B10E5443AEB3A1FB85BD4F804232EBAD17B86DF3CD555C704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
                          • String ID: bad locale name
                          • API String ID: 2775327233-1405518554
                          • Opcode ID: e0215012928c0a0b6f1e33361f839b0e1737b8e29b8da3f9e505fd5a306d6036
                          • Instruction ID: 3712cf454419587a3db452387ed4981f78042908c5875213193de77cd59a3137
                          • Opcode Fuzzy Hash: e0215012928c0a0b6f1e33361f839b0e1737b8e29b8da3f9e505fd5a306d6036
                          • Instruction Fuzzy Hash: C7417B32B0BB41E9EB94EFB4D8902AC32A4EF48788F044134DE4D63A55CF38D526D768
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
                          • String ID: bad locale name
                          • API String ID: 2775327233-1405518554
                          • Opcode ID: 903d6246ff1d40f738b63b3b94cb1a68e7245b863458539f83a2dc40311dc461
                          • Instruction ID: 7f1d7075900674146e477cf656c32000caeb94653a1fcace918feb90e081ba3b
                          • Opcode Fuzzy Hash: 903d6246ff1d40f738b63b3b94cb1a68e7245b863458539f83a2dc40311dc461
                          • Instruction Fuzzy Hash: 5B416932B0AA41E9EB94EFB0D8902EC63A4EF44788F044434EE4D67A55CF38D526D768
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                          • String ID: vector too long
                          • API String ID: 3936042273-2873823879
                          • Opcode ID: c3c7fdc940e69ba5ce45d1b963d3e03ddaf2e867e316d3fed9d6bbdb2af885f4
                          • Instruction ID: 14d235591be54f6a3def3df9c05cf0223fe04dabb2165892b5a74ab20f800970
                          • Opcode Fuzzy Hash: c3c7fdc940e69ba5ce45d1b963d3e03ddaf2e867e316d3fed9d6bbdb2af885f4
                          • Instruction Fuzzy Hash: 7321D022B17B46A1FFA89B64E48627862A1EF08BF4F244730D63D067D5EF6CD494C718
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AddressProc
                          • String ID: nvapi_QueryInterface$nvapi_pepQueryInterface
                          • API String ID: 190572456-3399614524
                          • Opcode ID: ce199ebd0ab1e12c069410e9a978059b744220c43281aa7dd3fdd9c7b8f6c4fc
                          • Instruction ID: 1d37797a55f6df519797064c656acb52b1e225c48047a7a08f3c82668273bc16
                          • Opcode Fuzzy Hash: ce199ebd0ab1e12c069410e9a978059b744220c43281aa7dd3fdd9c7b8f6c4fc
                          • Instruction Fuzzy Hash: 8B316020E1BB03B4FBDA8B5168402B47195EF447D0F184136D87E473E4EFACAC55AA38
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$_invalid_parameter_noinfo_noreturn
                          • String ID: Software\NVIDIA Corporation\Global\nViewProcessManager
                          • API String ID: 4182311823-2446852373
                          • Opcode ID: 811127d7ab7e8c4f3217a8d9402240c9c55366deb2a7352a091f7f819ddcc096
                          • Instruction ID: 682fa66bec03abeff205bddb484e2a9e7831d15737dbdb75490c079e33ef1390
                          • Opcode Fuzzy Hash: 811127d7ab7e8c4f3217a8d9402240c9c55366deb2a7352a091f7f819ddcc096
                          • Instruction Fuzzy Hash: 0731C63171AA85D5EB90DB15F4883BA7360FB94BC8F840031EA8E07A56DFBCD585CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: MessagePost$Window
                          • String ID: #
                          • API String ID: 625243999-1885708031
                          • Opcode ID: ec91c7267931f0259de04be5352fd3fb5e5bf072d78545cdd5dd902155c6f963
                          • Instruction ID: 437fffa15bc3137df39f30d5bd8ea694ac2d7693803093d51f871e78536ed675
                          • Opcode Fuzzy Hash: ec91c7267931f0259de04be5352fd3fb5e5bf072d78545cdd5dd902155c6f963
                          • Instruction Fuzzy Hash: E4318F32B19A819AE7508F1AF44066DB360FB88BE4F480135DE5D83B59DF7CD989CB14
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID: P
                          • API String ID: 0-3110715001
                          • Opcode ID: e760891b3d0586f10b0c45491ee25524a262a87b45dc8837c1d53ab325d03245
                          • Instruction ID: 6f5ade62d5a6d0ff208f9cfc31c82a711f12f4bd5838d28e51500aae390254ba
                          • Opcode Fuzzy Hash: e760891b3d0586f10b0c45491ee25524a262a87b45dc8837c1d53ab325d03245
                          • Instruction Fuzzy Hash: 09318D3260AB819AF3A09F15F44476AB3A4FB88B80F544135EA8D43B94DF3CE5198F54
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID: D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\API\ProfileFile.cpp$ReadLineBuffer::readLine$read error: expected %i bytes, got %i
                          • API String ID: 2738559852-2275707967
                          • Opcode ID: 37e7552c245c985d595b922226f18342388400da99a98cfa0d3c77cce1eaab47
                          • Instruction ID: 9c0ac7c2337b43374b5401a0462d6077f35b846fb411fd0625fa8084a1b17abf
                          • Opcode Fuzzy Hash: 37e7552c245c985d595b922226f18342388400da99a98cfa0d3c77cce1eaab47
                          • Instruction Fuzzy Hash: 64212872609B459AD750CF1AF48006AB7A1F788FC4FA4412AEB8D43B58DF3DE452CB58
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID: Software\NVIDIA Corporation\Global\nView$nViewNextLoaded
                          • API String ID: 0-3457015148
                          • Opcode ID: ae92a1c166b51266b53f1177d3491215868a216af05c38b4946b1a2d42acf1a8
                          • Instruction ID: a56a1a72341946a5f8a971065340784b2cbb3463f67bfe37fdb0cea4f6e54b8d
                          • Opcode Fuzzy Hash: ae92a1c166b51266b53f1177d3491215868a216af05c38b4946b1a2d42acf1a8
                          • Instruction Fuzzy Hash: 72117FB2A09B41D6EB408F15F08426AB7A0F7847D4F404036EB8E43B68EF7CD588CB44
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Event$Source$DeregisterRegisterReport
                          • String ID: nview
                          • API String ID: 3235303502-1067010723
                          • Opcode ID: cdf9007ae7e713f37f7c2785e0f3b77a63be6713e268f03e8f41f4b6f31fa15e
                          • Instruction ID: 1eab9d240204d472eea0e49aa60e88e44b330a482423a81a09b8af654ead8d82
                          • Opcode Fuzzy Hash: cdf9007ae7e713f37f7c2785e0f3b77a63be6713e268f03e8f41f4b6f31fa15e
                          • Instruction Fuzzy Hash: B511E332A09B91D9E7A09F11B45413AB6A1FB84BD0F140135EA8D13B59CF3CE6198F18
                          APIs
                            • Part of subcall function 00007FF8A8CC0920: SetFileAttributesW.KERNEL32 ref: 00007FF8A8CC0971
                            • Part of subcall function 00007FF8A8CC0920: DeleteFileW.KERNEL32 ref: 00007FF8A8CC097C
                            • Part of subcall function 00007FF8A8CBF190: RegCloseKey.ADVAPI32 ref: 00007FF8A8CBF25A
                            • Part of subcall function 00007FF8A8D3FBD8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF8A8D3FBF5
                            • Part of subcall function 00007FF8A8CB6150: RegOpenCurrentUser.ADVAPI32(?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB6181
                            • Part of subcall function 00007FF8A8CB6150: RegOpenKeyExW.ADVAPI32(?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB619A
                            • Part of subcall function 00007FF8A8CB6150: RegCloseKey.ADVAPI32(?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB61A7
                          • RegDeleteValueW.ADVAPI32 ref: 00007FF8A8CBEF43
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CBEF4E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$DeleteFileOpen$AttributesCurrentUserValue_invalid_parameter_noinfo
                          • String ID: LastProfile$Software\NVIDIA Corporation\Global\nViewInstalled
                          • API String ID: 1916527908-4012436165
                          • Opcode ID: a91fd182a3291124b559efa90d9f7cee95259ccae7721275cd2c65b1afc68d48
                          • Instruction ID: 3ecd8974438c7b22c294e50ae48eea1431c2c53356184b41b1579e2de6bd1ecd
                          • Opcode Fuzzy Hash: a91fd182a3291124b559efa90d9f7cee95259ccae7721275cd2c65b1afc68d48
                          • Instruction Fuzzy Hash: 5311C821F1AA8265FB90EB11E8413BA9391FFC4BC0F408031E98E47655DF6CD609CF54
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: MessagePost$FindWindow
                          • String ID: NVIDIA RTX Desktop Manager
                          • API String ID: 2066994869-1003537476
                          • Opcode ID: e7955320661e3a7a75743e46dc61c78f3004960059fa8ceadb6d457718d5c62b
                          • Instruction ID: f408800a0812f52e2c1b55108d027f78b7d02c6e94ab41fc37c0ac3400ded5d9
                          • Opcode Fuzzy Hash: e7955320661e3a7a75743e46dc61c78f3004960059fa8ceadb6d457718d5c62b
                          • Instruction Fuzzy Hash: EEF03035F1BA42EEEB949F15E891E292360FF88784F501531C91E03A64DF3CA948CB15
                          APIs
                            • Part of subcall function 00007FF8A8CC4530: RegOpenKeyExW.ADVAPI32 ref: 00007FF8A8CC4570
                            • Part of subcall function 00007FF8A8CC4530: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CC45AE
                            • Part of subcall function 00007FF8A8CC4530: RegCloseKey.ADVAPI32 ref: 00007FF8A8CC45D0
                            • Part of subcall function 00007FF8A8CC4530: RegOpenKeyExW.ADVAPI32 ref: 00007FF8A8CC45FE
                            • Part of subcall function 00007FF8A8CC48B0: RegOpenKeyExW.ADVAPI32 ref: 00007FF8A8CC4928
                            • Part of subcall function 00007FF8A8CC48B0: RegEnumValueW.ADVAPI32 ref: 00007FF8A8CC4962
                            • Part of subcall function 00007FF8A8CC48B0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CC49C1
                            • Part of subcall function 00007FF8A8CC48B0: RegCloseKey.ADVAPI32 ref: 00007FF8A8CC4ADA
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CC48A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpenValue$Query$Enum
                          • String ID: Hotkeys$Software\NVIDIA Corporation\Global\nView$SystemSubMenu
                          • API String ID: 920421334-3017348070
                          • Opcode ID: 582784c8c46b6a3e45548c249fc6da8832204fb5b35df2e6620f96a5510e8c89
                          • Instruction ID: 2ffbbd3f21012208e7755bc1e7c5da276e98d80ebe97c0d472e606452315d3be
                          • Opcode Fuzzy Hash: 582784c8c46b6a3e45548c249fc6da8832204fb5b35df2e6620f96a5510e8c89
                          • Instruction Fuzzy Hash: A1F037A1A19A87A4EB409B12F8812A56720FB957C0F506031FA5F47765DF2CD149CB64
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: RtlGetVersion$ntdll
                          • API String ID: 1646373207-2582309562
                          • Opcode ID: f67e7b80a2771548df8b19635896bdd6fae0fa5cf4ae97c25bf88dc721290c9c
                          • Instruction ID: 59fb470e26220f3e8df781e5bf7d628072fa9ee54418aa7e961df4db53af777f
                          • Opcode Fuzzy Hash: f67e7b80a2771548df8b19635896bdd6fae0fa5cf4ae97c25bf88dc721290c9c
                          • Instruction Fuzzy Hash: 40E0EC51F16501E9EE599B52E8450745350EF58B81F982031C92D0A350EF1DAAD9D728
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: DisplayEnum$DevicesSettings
                          • String ID:
                          • API String ID: 3866967763-0
                          • Opcode ID: 3179e2564a64a2aef85807642b598d5478656b8a350785dc36fec1f1945197a9
                          • Instruction ID: 2cf81c4df92427585299c631bb58f8de4f039cad7bcf6a65a1a928a70b967963
                          • Opcode Fuzzy Hash: 3179e2564a64a2aef85807642b598d5478656b8a350785dc36fec1f1945197a9
                          • Instruction Fuzzy Hash: 04516F27A19BC192E751CB28D5443ED77A0FBA8788F559222DF9C13652EF38E69DC300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Lockitstd::_$Lockit::_Lockit::~_
                          • String ID:
                          • API String ID: 593203224-0
                          • Opcode ID: a17f2d8281fa2ad0cbc7780a6880ffaa0d58f0273fdafe085c53cfeed498b287
                          • Instruction ID: a02a773ce1e6d6858ed45c5ab02ad543267b6ae46f96364622ffbef13ca1dced
                          • Opcode Fuzzy Hash: a17f2d8281fa2ad0cbc7780a6880ffaa0d58f0273fdafe085c53cfeed498b287
                          • Instruction Fuzzy Hash: 5821D6A1A4FA81A0EB91CB15D4481B97360FF94FC0F080032DB4D43795CF6DE856CB28
                          APIs
                            • Part of subcall function 00007FF8A8CB5CF0: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5D38
                            • Part of subcall function 00007FF8A8CB5CF0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB5D7E
                            • Part of subcall function 00007FF8A8CB5CF0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB5DD4
                            • Part of subcall function 00007FF8A8CB5CF0: RegCloseKey.ADVAPI32 ref: 00007FF8A8CB5DDF
                            • Part of subcall function 00007FF8A8CB5CF0: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5E22
                            • Part of subcall function 00007FF8A8CB5CF0: RegCloseKey.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5E31
                          • RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                          • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F88
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpen$CreateQueryValue$CurrentUser
                          • String ID:
                          • API String ID: 4257752288-0
                          • Opcode ID: 73137b15172d18191df6d3ab90d50aaab188b7ce44a6eda8af92f0be6991d6a3
                          • Instruction ID: 081fc16afa1fb069605d8752335727fee6aa9db6a6501696573740bf79cf096d
                          • Opcode Fuzzy Hash: 73137b15172d18191df6d3ab90d50aaab188b7ce44a6eda8af92f0be6991d6a3
                          • Instruction Fuzzy Hash: 8721E532A19B81CAE7A08F51F48475AF7A0F788BD4F545125EA8943B18CF7CC5488F04
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Create$EventThread$MutexPriority$CloseCurrentFileInfoMessageOpenQueryRegisterSystemValueViewWindow
                          • String ID:
                          • API String ID: 2624080922-0
                          • Opcode ID: 80c2d47d715e3e3a478fd7c71a3b2055e34da86c11bc4d2c090ebb0c5cb29dfc
                          • Instruction ID: 4b880c7ec9c4ebd74b71d23ad3d78a22be6ae70c3d2d9eac8515b26e45827dab
                          • Opcode Fuzzy Hash: 80c2d47d715e3e3a478fd7c71a3b2055e34da86c11bc4d2c090ebb0c5cb29dfc
                          • Instruction Fuzzy Hash: 2811BF34E0FA02EAFB94BB22A8011787251FFD4BC4F484030E91D43696DF6CEC498A28
                          APIs
                            • Part of subcall function 00007FF8A8CB5CF0: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5D38
                            • Part of subcall function 00007FF8A8CB5CF0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB5D7E
                            • Part of subcall function 00007FF8A8CB5CF0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB5DD4
                            • Part of subcall function 00007FF8A8CB5CF0: RegCloseKey.ADVAPI32 ref: 00007FF8A8CB5DDF
                            • Part of subcall function 00007FF8A8CB5CF0: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5E22
                            • Part of subcall function 00007FF8A8CB5CF0: RegCloseKey.ADVAPI32(?,?,?,?,?,%s %d,00007FF8A8CB616D,?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB5E31
                          • RegOpenCurrentUser.ADVAPI32(?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB6181
                          • RegOpenKeyExW.ADVAPI32(?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB619A
                          • RegCloseKey.ADVAPI32(?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB61A7
                          • RegOpenKeyExW.ADVAPI32(?,?,?,?,00080000,00007FF8A8CA07A7), ref: 00007FF8A8CB61D0
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Open$Close$QueryValue$CurrentUser
                          • String ID:
                          • API String ID: 3603212807-0
                          • Opcode ID: 08b29ea87bf51163e7e1e007bf81e82a65ae902ae200c20fac61567878a5f53b
                          • Instruction ID: cb7d155220b5355ace0a71df7ca8b5b8200c8bae18104830f1ee6a83245be415
                          • Opcode Fuzzy Hash: 08b29ea87bf51163e7e1e007bf81e82a65ae902ae200c20fac61567878a5f53b
                          • Instruction Fuzzy Hash: F8014C26B18B9186EB508B56F48451EE760FB88BE4F544035EF9D13F29CF7CC9998B08
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID: ios_base::failbit set
                          • API String ID: 73155330-3924258884
                          • Opcode ID: 9b6c570c9035688cfefed480fd4f4d797140a035135655b89860c2973c60c9fc
                          • Instruction ID: 069630798b7040d81e2a38b558d39d5d2148e37642ba4a33d09feafc11fd7157
                          • Opcode Fuzzy Hash: 9b6c570c9035688cfefed480fd4f4d797140a035135655b89860c2973c60c9fc
                          • Instruction Fuzzy Hash: 8D91FF32A0AB85A5EB548F15E44427D7360FB48FD4F198635EEAC03791DF38D594C714
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_taskDisplayEnumMonitorsRelease_invalid_parameter_noinfo_noreturn
                          • String ID: vector too long
                          • API String ID: 3103344671-2873823879
                          • Opcode ID: 00b5893f6815dd50e256614d8bc03589ac8b3f58f2ac44a187f63c999bb3d69f
                          • Instruction ID: 16e1cccc83ffcce89e3d4acfeee9285472b9e37c05ec2509cd0995ec7403dabd
                          • Opcode Fuzzy Hash: 00b5893f6815dd50e256614d8bc03589ac8b3f58f2ac44a187f63c999bb3d69f
                          • Instruction Fuzzy Hash: 0451E332E0AB82A5EA209B15E4403BD6361FF88BE4F444631DA7D077D6EF7CE4458724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: %s.%d
                          • API String ID: 3668304517-645285463
                          • Opcode ID: 9a9e68465c003b4178fc8f70b0deeba4abeef13a04c8b4ece2b2b021f16dc149
                          • Instruction ID: 6e7c8cfc1ba9f0d43dad8da7abddbeb0b668349731ed682540391874f66e0a51
                          • Opcode Fuzzy Hash: 9a9e68465c003b4178fc8f70b0deeba4abeef13a04c8b4ece2b2b021f16dc149
                          • Instruction Fuzzy Hash: 8C51CB62B1679199FB50CBA0D801BAC67B2FB04BA8F414236DE6D17B85DF7CD045C718
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Getvals
                          • String ID: false$true
                          • API String ID: 1336808981-2658103896
                          • Opcode ID: fcaa8dee8702df954b53bf384bd75b2644456ebc9bdddcb28530bd4f0760cdf8
                          • Instruction ID: 1bd899b0849baa89002c7cead5109264148e3362a12dca59cdf754cfc25b6690
                          • Opcode Fuzzy Hash: fcaa8dee8702df954b53bf384bd75b2644456ebc9bdddcb28530bd4f0760cdf8
                          • Instruction Fuzzy Hash: 2A419C22B09B81AAF710DF70E4401ED33B1FB58788F405226EE4D27A49EF38D69AC754
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: nvpowerapi.dll
                          • API String ID: 3215553584-3072377439
                          • Opcode ID: bab48af78a7f9719d753a41498632279feeef4d7c294e10ef8c51adfd2dc7925
                          • Instruction ID: 13ecafd19eeb2b9e598055100d4162d9dec539336769bd35d3de41f6d962aa9c
                          • Opcode Fuzzy Hash: bab48af78a7f9719d753a41498632279feeef4d7c294e10ef8c51adfd2dc7925
                          • Instruction Fuzzy Hash: 01411622E0F742A0EB68AB15905137936A0EB84BD4F585133E9BE0B3D5DF3CD589D728
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CharUpperlstrcmp
                          • String ID: {F1}
                          • API String ID: 1072818577-25428928
                          • Opcode ID: 8b3f7e535c0d9e0f92c1f6d16fbf536e2281558a38fc1ea8ceeff546a3c57a02
                          • Instruction ID: ae2a4c225a7e8ba89dcdfbc2aece8cf3dff7647d9807471367dc417d5bc29287
                          • Opcode Fuzzy Hash: 8b3f7e535c0d9e0f92c1f6d16fbf536e2281558a38fc1ea8ceeff546a3c57a02
                          • Instruction Fuzzy Hash: 1A21D172B09B01E6EA208F15E44017A73E2FF84BC4F940135EA9C03A55EF3CD505CB18
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID: NVIEW PROFILE LOCK
                          • API String ID: 2738559852-3082433184
                          • Opcode ID: ab27f8d0231a89b0cb702682be9596c8e9e922d8ba3a70dd5091fb8da4012714
                          • Instruction ID: e1d2da4769156a4c1258e1ac73f7d802d67f5f82614d6a2b241a54b5995e7ff2
                          • Opcode Fuzzy Hash: ab27f8d0231a89b0cb702682be9596c8e9e922d8ba3a70dd5091fb8da4012714
                          • Instruction Fuzzy Hash: FE317C63D197C186E7608B24E5147BAB360FBE9794F409326EB9C02699EF7CD198CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseLoadString
                          • String ID: LastProfile$Software\NVIDIA Corporation\Global\nViewInstalled
                          • API String ID: 3181190470-4012436165
                          • Opcode ID: 225780e9763e1516308caab6c0161e58fc1a2148f321a7ab74f31956032f353a
                          • Instruction ID: 6f6dce8562882c295ee317782e4705647d46c06b3876c6fbfd57a6462c8858d3
                          • Opcode Fuzzy Hash: 225780e9763e1516308caab6c0161e58fc1a2148f321a7ab74f31956032f353a
                          • Instruction Fuzzy Hash: B421CF36B2AB8596EF609B55E5543BA62A0FF84BC4F404035CA8D43B85DF6CC604CB14
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_Yarn
                          • String ID: bad locale name
                          • API String ID: 1838369231-1405518554
                          • Opcode ID: c524e6af0baa67fe1cc82a5cd4aa5f82788b02c5eb321f0c46adb42b5351efdd
                          • Instruction ID: 49ed8c77eef808dff4f45158a94695498848c5abc00aa568561083f26875e79e
                          • Opcode Fuzzy Hash: c524e6af0baa67fe1cc82a5cd4aa5f82788b02c5eb321f0c46adb42b5351efdd
                          • Instruction Fuzzy Hash: 8601D623506B8499C785DF79A88016C77B5FB58FC4B185138CB8C8370AEF38C590C754
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Window$RectText
                          • String ID: hwnd(0x%08x) pos(%d %d) dim(%d %d) %s
                          • API String ID: 3244772712-1731226318
                          • Opcode ID: ab3949e57376ec885a1af7c9daca5177edca3585cc7dbd67c50f2748e189522b
                          • Instruction ID: f2adbaa60065e7751c92ad190d7088dda017ef079fdb0c76b467e0120b4ee775
                          • Opcode Fuzzy Hash: ab3949e57376ec885a1af7c9daca5177edca3585cc7dbd67c50f2748e189522b
                          • Instruction Fuzzy Hash: 95118C72A287848AEB108B16E44436AF760FB887D0F404121EE8D03B28DBBCD998CF00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Current$FormatFreeLocalMessageProcessThread
                          • String ID: API function failed with %d: %s
                          • API String ID: 1087594894-470931892
                          • Opcode ID: 0f953ed10209e1cd2ae3cab99d472e1bb3b644d22f0039629b56ab57d6aab400
                          • Instruction ID: fd0865240ad0c0769d0ca9d081fe566f015a51c1731ec09569dfaaa92a2a75a4
                          • Opcode Fuzzy Hash: 0f953ed10209e1cd2ae3cab99d472e1bb3b644d22f0039629b56ab57d6aab400
                          • Instruction Fuzzy Hash: C6113C32A19B818AD750CF16F88015AB6A5F788BC0F584139FB8D83F19DF3CDA118B44
                          APIs
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8CBEEA8
                            • Part of subcall function 00007FF8A8CB6490: RegSetValueExW.ADVAPI32 ref: 00007FF8A8CB64B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$CreateCurrentOpenUserValue
                          • String ID: NthUiLaunch$Software\NVIDIA Corporation\Global\nViewInstalled
                          • API String ID: 3889337403-550885321
                          • Opcode ID: 8b198f5b1b929e48d21a4385c74c3e5f7b665a8b9032fc9aac2763412c396a49
                          • Instruction ID: 116982b5e4cb896b2cc48b3a3862f26a69d2fac17ceb8f5c76445d74ac2ba5da
                          • Opcode Fuzzy Hash: 8b198f5b1b929e48d21a4385c74c3e5f7b665a8b9032fc9aac2763412c396a49
                          • Instruction Fuzzy Hash: 1501D832B1ED82A9EBD09B15E4847796760EB91BC0F641035EB4E03A68DF3CD984CF24
                          APIs
                            • Part of subcall function 00007FF8A8CB5ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F11
                            • Part of subcall function 00007FF8A8CB5ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F45
                            • Part of subcall function 00007FF8A8CB5ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A8C9EA7C), ref: 00007FF8A8CB5F52
                          • RegDeleteKeyW.ADVAPI32 ref: 00007FF8A8C9EB6C
                          • RegCloseKey.ADVAPI32 ref: 00007FF8A8C9EB7C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$CreateCurrentDeleteOpenUser
                          • String ID: Software\NVIDIA Corporation\Global\nViewProcessManager
                          • API String ID: 2348892725-2446852373
                          • Opcode ID: 4cdecf1be57e3eb5c32599c83fbbabbfc200573c8a22f7d3089e1da6e001a820
                          • Instruction ID: 2ef7e5cdb08db9ba15ef8ce8c826084ea3d6f962f259ac28706e2b27159f0637
                          • Opcode Fuzzy Hash: 4cdecf1be57e3eb5c32599c83fbbabbfc200573c8a22f7d3089e1da6e001a820
                          • Instruction Fuzzy Hash: 5101F531719A8196EB608B11F8893BA7320FBC87C8F800131DA9D47A55CF7CD508CB18
                          APIs
                            • Part of subcall function 00007FF8A8CB6130: RegOpenKeyExW.ADVAPI32 ref: 00007FF8A8CB613C
                            • Part of subcall function 00007FF8A8CB6230: RegQueryValueExW.ADVAPI32 ref: 00007FF8A8CB6251
                          • RegCloseKey.ADVAPI32(?,?,00000000,00007FF8A8CBF3FF), ref: 00007FF8A8D78C89
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: DesktopManagement$GridsPerDesk
                          • API String ID: 3677997916-1540049280
                          • Opcode ID: 7eee674358a3c35741c843a1e49bdab505263c479b0805db403157cda88218dc
                          • Instruction ID: 166b23752b8e1deb44179d576f226ada9fed58b141085d2ae54f3b966619540f
                          • Opcode Fuzzy Hash: 7eee674358a3c35741c843a1e49bdab505263c479b0805db403157cda88218dc
                          • Instruction Fuzzy Hash: 7001AD72708B429ADB009F6AE4801AAB7B0FB897C0F604036EB9D83B19DF3DC454CB04
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3974619672.00007FF8A8C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A8C30000, based on PE: true
                          • Associated: 00000000.00000002.3974586040.00007FF8A8C30000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3974773570.00007FF8A8DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3975687870.00007FF8A8DF4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3977832536.00007FF8A8DF6000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3980489988.00007FF8A8DF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3983459754.00007FF8A8DFE000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff8a8c30000_loaddll64.jbxd
                          Similarity
                          • API ID: ErrorLast$FreeLocal
                          • String ID:
                          • API String ID: 1627422176-0
                          • Opcode ID: 45d03da843b7eb71680eb8731c5b4906c31a2aa6ec7f343a47b717000f953ddf
                          • Instruction ID: 1de223d600168df2111e7186fb30d7cdd8ae574353caeb5f89fee834b3556a60
                          • Opcode Fuzzy Hash: 45d03da843b7eb71680eb8731c5b4906c31a2aa6ec7f343a47b717000f953ddf
                          • Instruction Fuzzy Hash: FC212521F1F64296EB549B16A50017992A0EF84BE0F481131EE7E43BD9DF3CECC88368