Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2tytrCyNuF.msi

Overview

General Information

Sample name:2tytrCyNuF.msi
renamed because original name is a hash value
Original sample name:19adf18044aa497dc793d0f117dfb1b68800c93e0cfde82837aa1aecc24bd70e.msi
Analysis ID:1592144
MD5:8438efc424aca0df22b0987e54ebedf9
SHA1:8f1f9a179a4784d3543c7a476c01181bceb93b18
SHA256:19adf18044aa497dc793d0f117dfb1b68800c93e0cfde82837aa1aecc24bd70e
Tags:bankerlatammsitrojanuser-johnk3r
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for dropped file
Overwrites code with function prologues
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Switches to a custom stack to bypass stack traces
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Launches processes in debugging mode, may be used to hinder debugging
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msiexec.exe (PID: 7596 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\2tytrCyNuF.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 7628 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7696 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 7DBAA4AD04C4E7682ABB0AAAF07D1209 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • Flexpcis.exe (PID: 7836 cmdline: "C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe" MD5: E04F15D35A1807C4D74D2538D5FE28C9)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Drivespan.dllAvira: detection malicious, Label: HEUR/AGEN.1327653
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Drivespan.dllVirustotal: Detection: 31%Perma Link
Source: 2tytrCyNuF.msiVirustotal: Detection: 11%Perma Link
Source: 2tytrCyNuF.msiReversingLabs: Detection: 13%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Drivespan.dllJoe Sandbox ML: detected
Source: Binary string: c:\builds\workspace\Applications\Transfer_common\src\Release\Transfer.pdb source: Flexpcis.exe, 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000003.00000000.1747695042.00000000009FF000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: 2tytrCyNuF.msi, MSI3AF2.tmp.1.dr, 4937c9.msi.1.dr, MSI3D58.tmp.1.dr, 4937c6.msi.1.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: Flexpcis.exe.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: Flexpcis.exe.1.drString found in binary or memory: http://ocsp.thawte.com0
Source: Flexpcis.exe.1.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: Flexpcis.exe.1.drString found in binary or memory: http://s.symcd.com06
Source: Flexpcis.exe.1.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: Flexpcis.exe.1.drString found in binary or memory: http://s2.symcb.com0
Source: Flexpcis.exe.1.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: Flexpcis.exe.1.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: Flexpcis.exe.1.drString found in binary or memory: http://sv.symcd.com0&
Source: Flexpcis.exe.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: Flexpcis.exe.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: Flexpcis.exe.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: Flexpcis.exe.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: Flexpcis.exe.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: Flexpcis.exe.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: Flexpcis.exe, 00000003.00000003.2042407030.0000000005C3F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.indyproject.org/
Source: Flexpcis.exe.1.drString found in binary or memory: http://www.nero.com
Source: Flexpcis.exe.1.drString found in binary or memory: http://www.symauth.com/cps0(
Source: Flexpcis.exe.1.drString found in binary or memory: http://www.symauth.com/rpa00
Source: Flexpcis.exe.1.drString found in binary or memory: https://d.symcb.com/cps0%
Source: Flexpcis.exe.1.drString found in binary or memory: https://d.symcb.com/rpa0
Source: Flexpcis.exe.1.drString found in binary or memory: https://d.symcb.com/rpa0.

System Summary

barindex
Source: Drivespan.dll.1.drStatic PE information: section name: .,Lm
Source: Drivespan.dll.1.drStatic PE information: section name: .j'<
Source: Drivespan.dll.1.drStatic PE information: section name: .fd>
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4937c6.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3AF2.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3B61.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3BA0.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3CDA.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3D58.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{E49D674A-6F2A-43F2-A5F6-7C3AABA5E5C8}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3FD9.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4937c9.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4937c9.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI3AF2.tmpJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009FCD153_2_009FCD15
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe 7E4132835419E4C415D048B64A5FC2813B8D2FF72BB5586D857DCDF6A90A45F2
Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI3AF2.tmp D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
Source: Drivespan.dll.1.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: Drivespan.dll.1.drStatic PE information: Number of sections : 13 > 10
Source: 2tytrCyNuF.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs 2tytrCyNuF.msi
Source: classification engineClassification label: mal88.evad.winMSI@6/26@0/0
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F1510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep,3_2_009F1510
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CML40BF.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF9A96319E3287E2A1.TMPJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCommand line argument: 3Ro3_2_009F17A0
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCommand line argument: -Restart3_2_009F17A0
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCommand line argument: drivespan.dll3_2_009F17A0
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCommand line argument: drivespan.dll3_2_009F17A0
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCommand line argument: run3_2_009F17A0
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 2tytrCyNuF.msiVirustotal: Detection: 11%
Source: 2tytrCyNuF.msiReversingLabs: Detection: 13%
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\2tytrCyNuF.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 7DBAA4AD04C4E7682ABB0AAAF07D1209
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe "C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe"
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 7DBAA4AD04C4E7682ABB0AAAF07D1209Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe "C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe"Jump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: drivespan.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeSection loaded: kernel.appcore.dllJump to behavior
Source: 2tytrCyNuF.msiStatic file information: File size 20951552 > 1048576
Source: Binary string: c:\builds\workspace\Applications\Transfer_common\src\Release\Transfer.pdb source: Flexpcis.exe, 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe, 00000003.00000000.1747695042.00000000009FF000.00000002.00000001.01000000.00000003.sdmp, Flexpcis.exe.1.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: 2tytrCyNuF.msi, MSI3AF2.tmp.1.dr, 4937c9.msi.1.dr, MSI3D58.tmp.1.dr, 4937c6.msi.1.dr
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F1000 SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,3_2_009F1000
Source: initial sampleStatic PE information: section where entry point is pointing to: .fd>
Source: Drivespan.dll.1.drStatic PE information: section name: .didata
Source: Drivespan.dll.1.drStatic PE information: section name: .,Lm
Source: Drivespan.dll.1.drStatic PE information: section name: .j'<
Source: Drivespan.dll.1.drStatic PE information: section name: .fd>
Source: MSI3AF2.tmp.1.drStatic PE information: section name: .fptable
Source: MSI3B61.tmp.1.drStatic PE information: section name: .fptable
Source: MSI3BA0.tmp.1.drStatic PE information: section name: .fptable
Source: MSI3CDA.tmp.1.drStatic PE information: section name: .fptable
Source: MSI3D58.tmp.1.drStatic PE information: section name: .fptable
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F3016 push ecx; ret 3_2_009F3029
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3BA0.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3AF2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3B61.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Drivespan.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3CDA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3D58.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3BA0.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3AF2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3B61.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3CDA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3D58.tmpJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 76ECBA30 value: 8B FF 55 8B EC Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 75BF4D90 value: 8B FF 55 8B EC Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 75C0EBF0 value: 8B FF 55 8B EC Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 74FD8A90 value: 8B FF 55 8B EC Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 75000230 value: 8B FF 55 8B EC Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: B60005 value: E9 8B 2F 3A 76 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 76F02F90 value: E9 7A D0 C5 89 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: D80005 value: E9 2B BA 14 76 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 76ECBA30 value: E9 DA 45 EB 89 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: D90008 value: E9 8B 8E 18 76 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 76F18E90 value: E9 80 71 E7 89 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: DB0005 value: E9 8B 4D E4 74 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 75BF4D90 value: E9 7A B2 1B 8B Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: DC0005 value: E9 EB EB E4 74 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 75C0EBF0 value: E9 1A 14 1B 8B Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: DD0005 value: E9 8B 8A 20 74 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 74FD8A90 value: E9 7A 75 DF 8B Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: DE0005 value: E9 2B 02 22 74 Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeMemory written: PID: 7836 base: 75000230 value: E9 DA FD DD 8B Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 59A1406
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 48527FD
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 594E3E1
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 47D5F9A
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 4746189
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 58D04F1
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 477A6A8
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 595D280
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 475A291
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 58EB78C
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 594E51A
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 592A582
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 592D746
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 57E6EA9
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 47C5024
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 4BB90E7
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 4AF0BD8
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI/Special instruction interceptor: Address: 4B0B734
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F1510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep,3_2_009F1510
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI3BA0.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI3AF2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI3B61.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI3CDA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI3D58.tmpJump to dropped file
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeAPI coverage: 8.9 %
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F55D7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_009F55D7
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F1510 GetModuleFileNameW,GetCurrentProcessId,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Sleep,CloseHandle,Sleep,3_2_009F1510
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F1000 SHGetFolderPathW,PathFileExistsW,PathFileExistsW,PathFileExistsW,MoveFileExW,PathFileExistsW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,3_2_009F1000
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F6268 mov eax, dword ptr fs:[00000030h]3_2_009F6268
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F9302 GetProcessHeap,3_2_009F9302
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe "C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe"Jump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F2821 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_009F2821
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F55D7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_009F55D7
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F2DC9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_009F2DC9
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F2F17 SetUnhandledExceptionFilter,3_2_009F2F17
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F305C cpuid 3_2_009F305C
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeCode function: 3_2_009F2CB2 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_009F2CB2
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
21
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory23
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets123
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
File Deletion
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2tytrCyNuF.msi12%VirustotalBrowse
2tytrCyNuF.msi13%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Drivespan.dll100%AviraHEUR/AGEN.1327653
C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Drivespan.dll100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Drivespan.dll32%VirustotalBrowse
C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe0%VirustotalBrowse
C:\Windows\Installer\MSI3AF2.tmp0%ReversingLabs
C:\Windows\Installer\MSI3AF2.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI3B61.tmp0%ReversingLabs
C:\Windows\Installer\MSI3B61.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI3BA0.tmp0%ReversingLabs
C:\Windows\Installer\MSI3BA0.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI3CDA.tmp0%ReversingLabs
C:\Windows\Installer\MSI3CDA.tmp0%VirustotalBrowse
C:\Windows\Installer\MSI3D58.tmp0%ReversingLabs
C:\Windows\Installer\MSI3D58.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.indyproject.org/Flexpcis.exe, 00000003.00000003.2042407030.0000000005C3F000.00000004.00001000.00020000.00000000.sdmpfalse
    high
    http://crl.thawte.com/ThawteTimestampingCA.crl0Flexpcis.exe.1.drfalse
      high
      http://www.symauth.com/cps0(Flexpcis.exe.1.drfalse
        high
        http://www.symauth.com/rpa00Flexpcis.exe.1.drfalse
          high
          http://ocsp.thawte.com0Flexpcis.exe.1.drfalse
            high
            http://www.nero.comFlexpcis.exe.1.drfalse
              high
              No contacted IP infos
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1592144
              Start date and time:2025-01-15 20:34:13 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 18s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:2tytrCyNuF.msi
              renamed because original name is a hash value
              Original Sample Name:19adf18044aa497dc793d0f117dfb1b68800c93e0cfde82837aa1aecc24bd70e.msi
              Detection:MAL
              Classification:mal88.evad.winMSI@6/26@0/0
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 93%
              • Number of executed functions: 5
              • Number of non-executed functions: 23
              Cookbook Comments:
              • Found application associated with file extension: .msi
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 52.168.117.173, 52.149.20.212, 13.107.246.45
              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              No simulations
              No context
              No context
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exeIRPF2024-0940959038w904598304w985036.msiGet hashmaliciousUnknownBrowse
                NFeNFCe.msiGet hashmaliciousUnknownBrowse
                  Fct63e39.msiGet hashmaliciousUnknownBrowse
                    C:\Windows\Installer\MSI3AF2.tmpmsit.exeGet hashmaliciousLummaC StealerBrowse
                      msit.msiGet hashmaliciousLummaC StealerBrowse
                        Fact30.NATURGY.LUNESGRLNOPAGOID3012021414252024.MSI.msiGet hashmaliciousUnknownBrowse
                          Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msiGet hashmaliciousUnknownBrowse
                            bmouJCkvam.msiGet hashmaliciousUnknownBrowse
                              FS-SZHAJCVS.msiGet hashmaliciousUnknownBrowse
                                FS-JFDIBGWE.msiGet hashmaliciousUnknownBrowse
                                  http://propdfhub.comGet hashmaliciousUnknownBrowse
                                    http://res.pdfonestartlive.comGet hashmaliciousUnknownBrowse
                                      740d3a.msiGet hashmaliciousUnknownBrowse
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):9993
                                        Entropy (8bit):5.548322894194191
                                        Encrypted:false
                                        SSDEEP:192:mlhWLuxksRewixSauWf3w3ujMOE+X3ujMOkls+tByr2V6L/p+yz2FCPw/6:ml8ixksjvauWfgejMsXejM7lRtByr2Ve
                                        MD5:5DCE66C6DE333C03E98DAA6EECC59E36
                                        SHA1:8CF31F608B725209E0C7FD8306F195F992976761
                                        SHA-256:D2F0A7220BF08B44D149818D1E3DDBC5B8832032B8D71E28F381E4A92F4B1D73
                                        SHA-512:C6FD2BB15A289B8C33AB2799ECD2B52C1C490D20E27BCD36DCDE010C3CEB56683D8BEBAD0D649DBBE8DADE79F77150B91C83A3E2DEC741C09AAD8AFDEDE6F61A
                                        Malicious:false
                                        Reputation:low
                                        Preview:...@IXOS.@.....@ft/Z.@.....@.....@.....@.....@.....@......&.{E49D674A-6F2A-43F2-A5F6-7C3AABA5E5C8}..Microsoft Corporativa..2tytrCyNuF.msi.@.....@.....@.....@........&.{70E7C985-4726-4956-A0F5-45A631F7DDEE}.....@.....@.....@.....@.......@.....@.....@.......@......Microsoft Corporativa......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]....ProcessComponents%.Atualizando o registro de componentes..&.{CDEA45A4-A39D-41FB-B2DA-1FD0E8595250}&.{E49D674A-6F2A-43F2-A5F6-7C3AABA5E5C8}.@......&.{676D84DC-BFDA-4068-9A01-16D4BF1D67D8}&.{E49D674A-6F2A-43F2-A5F6-7C3AABA5E5C8}.@......&.{B4AEC35F-8627-4D8B-B76B-3F5B9A45B1D9}&.{E49D674A-6F2A-43F2-A5F6-7C3AABA5E5C8}.@......&.{AFCBD693-8D7A-436E-B38F-8184EB8332E6}&.{E49D674A-6F2A-43F2-A5F6-7C3AABA5E5C8}.@........CreateFolders..Criando novas pastas..Pasta: [1]#.=.C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\.@........InstallFiles..Copiando arquivos novos*.A.r.q.u.i.v.o.:. .[.1.
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):19726848
                                        Entropy (8bit):7.975847496143139
                                        Encrypted:false
                                        SSDEEP:393216:x6cc0NIYj5K5IEOa3QrWrah6loH7JQu8WW+NJsW084ijkjml:xRcBsQ3OoQirah6e7J8mqq4i4jm
                                        MD5:F05A4BC3F0A887D1EFF099D7DE6D6EB5
                                        SHA1:AB372E891921C8D77AD3407EAC0FDC68EB5CD58E
                                        SHA-256:BE446EFCACEFF36613FCF9092164AE37E8F27D662D6E088A15C1126A8471E1C8
                                        SHA-512:8C9160B1DDF5BD64772C8251FAC279EEE9DF4CFC1DDAF0531D07D4B6688A329B9B592B5C43A3C8EA94771F84887E5443AD7CC3C46F5B60D0AF47DFEA63E118CE
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: Virustotal, Detection: 32%, Browse
                                        Reputation:low
                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L...-..g.................l9...)...............9...@..................................................................#.................X.......................D.......................................................d...t........................text....>9......................... ..`.itext...+...P9..................... ..`.data.........9.....................@....bss....pv...`:..........................idata...4....:.....................@....didata.h.... ;.....................@....edata.......0;.....................@..@.rdata..E....@;.....................@..@.,Lm.........P;..................... ..`.j'<....|...........................@....fd>....`.,.......,................. ..`.rsrc...X.............,.............@..@.reloc..D.............,.............@..B.....................0d......Zc.............@..@........................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):138520
                                        Entropy (8bit):5.97678172694547
                                        Encrypted:false
                                        SSDEEP:3072:h1tkoMvK2ZjKlrH5ySykwTzwk5aOz1b3aDczMns53:h1tkpZyCj1mDcIu3
                                        MD5:E04F15D35A1807C4D74D2538D5FE28C9
                                        SHA1:9A42B387BABDEA719D54C1E11BAAE9FDB9897F71
                                        SHA-256:7E4132835419E4C415D048B64A5FC2813B8D2FF72BB5586D857DCDF6A90A45F2
                                        SHA-512:0FA81E472CC65AC3E0DC6427D72002905C577B61C98CBB2859829EF5A139B1AC81FA09D680614C4EA94D599919E67C62F28475AF813400106DDDABE57180AAE9
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                        Joe Sandbox View:
                                        • Filename: IRPF2024-0940959038w904598304w985036.msi, Detection: malicious, Browse
                                        • Filename: NFeNFCe.msi, Detection: malicious, Browse
                                        • Filename: Fct63e39.msi, Detection: malicious, Browse
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`u.h$.f;$.f;$.f;...;-.f;...;].f;...;<.f;.Je:6.f;.Jc:..f;.Jb:6.f;..;-.f;$.g;y.f;.Jo:&.f;.J.;%.f;$..;%.f;.Jd:%.f;Rich$.f;........PE..L....&.].........."..................(............@..........................@......Q.....@.................................DI..d.......8................3...0......@;..p............................;..@...............4............................text.../........................... ..`.rdata..L`.......b..................@..@.data........`.......8..............@....gfids...............B..............@..@.rsrc...8............D..............@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {70E7C985-4726-4956-A0F5-45A631F7DDEE}, Number of Words: 10, Subject: Microsoft Corporativa, Author: @Klabin, Name of Creating Application: Microsoft Corporativa, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Microsoft Corporativa., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jan 14 00:51:03 2025, Last Saved Time/Date: Tue Jan 14 00:51:03 2025, Last Printed: Tue Jan 14 00:51:03 2025, Number of Pages: 450
                                        Category:dropped
                                        Size (bytes):20951552
                                        Entropy (8bit):7.9673458298105695
                                        Encrypted:false
                                        SSDEEP:393216:tktwyY0daED8wromlva/UNzoGFaCwn/gRUgTD0Hsc23sfr:tkYcaEQw8mha/UNZFabnekscisfr
                                        MD5:8438EFC424ACA0DF22B0987E54EBEDF9
                                        SHA1:8F1F9A179A4784D3543C7A476C01181BCEB93B18
                                        SHA-256:19ADF18044AA497DC793D0F117DFB1B68800C93E0CFDE82837AA1AECC24BD70E
                                        SHA-512:3AF72B150EF511391CCB89866BCC55B7D060EB6316B04E8BDDC178F57A4EFCE8DFD4FC637C8E406105D70C0E4A999DD8B227C8BD65411FEF98AED6DB9018FB5C
                                        Malicious:false
                                        Reputation:low
                                        Preview:......................>...................@...................................F.......c.......o...........................................................................................................................................................................................................................................................................................................................................................................................................................................<...........!...4............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...5...2...3...=...?...6...7...8...9...:...;...E.......>.......@...A...B...C...D...............H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {70E7C985-4726-4956-A0F5-45A631F7DDEE}, Number of Words: 10, Subject: Microsoft Corporativa, Author: @Klabin, Name of Creating Application: Microsoft Corporativa, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Microsoft Corporativa., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jan 14 00:51:03 2025, Last Saved Time/Date: Tue Jan 14 00:51:03 2025, Last Printed: Tue Jan 14 00:51:03 2025, Number of Pages: 450
                                        Category:dropped
                                        Size (bytes):20951552
                                        Entropy (8bit):7.9673458298105695
                                        Encrypted:false
                                        SSDEEP:393216:tktwyY0daED8wromlva/UNzoGFaCwn/gRUgTD0Hsc23sfr:tkYcaEQw8mha/UNZFabnekscisfr
                                        MD5:8438EFC424ACA0DF22B0987E54EBEDF9
                                        SHA1:8F1F9A179A4784D3543C7A476C01181BCEB93B18
                                        SHA-256:19ADF18044AA497DC793D0F117DFB1B68800C93E0CFDE82837AA1AECC24BD70E
                                        SHA-512:3AF72B150EF511391CCB89866BCC55B7D060EB6316B04E8BDDC178F57A4EFCE8DFD4FC637C8E406105D70C0E4A999DD8B227C8BD65411FEF98AED6DB9018FB5C
                                        Malicious:false
                                        Preview:......................>...................@...................................F.......c.......o...........................................................................................................................................................................................................................................................................................................................................................................................................................................<...........!...4............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...5...2...3...=...?...6...7...8...9...:...;...E.......>.......@...A...B...C...D...............H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1021792
                                        Entropy (8bit):6.608380087035959
                                        Encrypted:false
                                        SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                        MD5:EC6EBF65FE4F361A73E473F46730E05C
                                        SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                        SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                        SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                        Joe Sandbox View:
                                        • Filename: msit.exe, Detection: malicious, Browse
                                        • Filename: msit.msi, Detection: malicious, Browse
                                        • Filename: Fact30.NATURGY.LUNESGRLNOPAGOID3012021414252024.MSI.msi, Detection: malicious, Browse
                                        • Filename: Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msi, Detection: malicious, Browse
                                        • Filename: bmouJCkvam.msi, Detection: malicious, Browse
                                        • Filename: FS-SZHAJCVS.msi, Detection: malicious, Browse
                                        • Filename: FS-JFDIBGWE.msi, Detection: malicious, Browse
                                        • Filename: , Detection: malicious, Browse
                                        • Filename: , Detection: malicious, Browse
                                        • Filename: 740d3a.msi, Detection: malicious, Browse
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1021792
                                        Entropy (8bit):6.608380087035959
                                        Encrypted:false
                                        SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                        MD5:EC6EBF65FE4F361A73E473F46730E05C
                                        SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                        SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                        SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1021792
                                        Entropy (8bit):6.608380087035959
                                        Encrypted:false
                                        SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                        MD5:EC6EBF65FE4F361A73E473F46730E05C
                                        SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                        SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                        SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1021792
                                        Entropy (8bit):6.608380087035959
                                        Encrypted:false
                                        SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                        MD5:EC6EBF65FE4F361A73E473F46730E05C
                                        SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                        SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                        SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):1021792
                                        Entropy (8bit):6.608380087035959
                                        Encrypted:false
                                        SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                        MD5:EC6EBF65FE4F361A73E473F46730E05C
                                        SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                        SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                        SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):3213
                                        Entropy (8bit):5.458796259969811
                                        Encrypted:false
                                        SSDEEP:96:y5PkzDGWgDUALlDblDqNilDM1lDTVlDFlDv8Rg7i6plDzlDJ2NknPkt0KlDkXUIc:ylhWLbHfWg7ig2qP7zXub
                                        MD5:D8D57614A1C2D22BC89DACDD67B75565
                                        SHA1:6BB7D28A5677EB3A96972AF8F6D384DD8FCC8441
                                        SHA-256:3016A122844B6E015E2C3F3E79A0F3627166E3B9BCBEB91A0FF93B805DBFEEC2
                                        SHA-512:4B0C5250F37DE458F4077EA9FA8CF99AE7E5AAE0B98AD6C55B095213650291942D785B6827E93B8A8979EAAECA9D60CCE285D6F9F5EDFCEC66BABC3C207FD789
                                        Malicious:false
                                        Preview:...@IXOS.@.....@et/Z.@.....@.....@.....@.....@.....@......&.{E49D674A-6F2A-43F2-A5F6-7C3AABA5E5C8}..Microsoft Corporativa..2tytrCyNuF.msi.@.....@.....@.....@........&.{70E7C985-4726-4956-A0F5-45A631F7DDEE}.....@.....@.....@.....@.......@.....@.....@.......@......Microsoft Corporativa......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]...@.......@........ProcessComponents%.Atualizando o registro de componentes...@.....@.....@.]....&.{CDEA45A4-A39D-41FB-B2DA-1FD0E8595250}=.C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\.@.......@.....@.....@......&.{676D84DC-BFDA-4068-9A01-16D4BF1D67D8}2.01:\Software\@Klabin\Microsoft Corporativa\Version.@.......@.....@.....@......&.{B4AEC35F-8627-4D8B-B76B-3F5B9A45B1D9}I.C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe.@.......@.....@.....@......&.{AFCBD693-8D7A-436E-B38F-8184EB8332E6}J.C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Driv
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):1.1635961277482734
                                        Encrypted:false
                                        SSDEEP:12:JSbX72FjyAGiLIlHVRpZh/7777777777777777777777777vDHFWMWtX5SCYbitr:JIQI5t4PxYiiF
                                        MD5:3FA2A381EA66BA3E2DA448BCADD00C77
                                        SHA1:D4A04BC7A6DAE7ABB301B9F46814C1F89D45B7AF
                                        SHA-256:B79E9BC59E479D1937967C0ED2D7C02B5F8398B522BC7A82E3EA785DFFFE60D6
                                        SHA-512:C2FEF509D6452ACA603CBFAEBAF73CA37A703D3C3F6AB6F183F4EF1B8D1E55E9646B570EE6B7CC5B7041010BF092BB3A90F5551076ED761F6B704C8AEB26F6CB
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):1.5575378309412877
                                        Encrypted:false
                                        SSDEEP:48:yy8Ph8uRc06WXJ0nT5F8sgWfxSCPAECiCytoc+xSCbT8vq:2h813nT7Fg8oECGsMv
                                        MD5:8B188186E9CE2FA322FB2105A840CB05
                                        SHA1:A2790381B3684BC2C0F55C20670BF8EB640C4491
                                        SHA-256:ADF243BA29EF2AF4A08368A74B9C23D202BC78B2FA7F748FE9DA283B6A23BA3D
                                        SHA-512:A5A9D5D8AC8BF44B7B4F8B2E363ABB4D9B30DB4B6ADEB71537F8CE87D1F30FEA75526E38D321BD7EB4CBA9F6FE2B4E051178E24D0283ACEE52BD7CA3F3915436
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):432221
                                        Entropy (8bit):5.375175225113304
                                        Encrypted:false
                                        SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauJ:zTtbmkExhMJCIpEro
                                        MD5:1C1BA891FB376EDD36E550749660411B
                                        SHA1:11F7408EBBF08581594B7A5B71EBEB6354A2F405
                                        SHA-256:CAA3B85B84ED1E6FBB720E13C35DEFB6BB04AFEBB1841245F2C5F3DA967EA615
                                        SHA-512:36B00F71176C67068D8E4AF8C1E27FB29DCCCC23513EA79E25234BFD1CA9E38B53611E3B1216A724AA5DDE44026260DAFEF0B84F37BFE4D847C666A4FB58B247
                                        Malicious:false
                                        Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):1.5575378309412877
                                        Encrypted:false
                                        SSDEEP:48:yy8Ph8uRc06WXJ0nT5F8sgWfxSCPAECiCytoc+xSCbT8vq:2h813nT7Fg8oECGsMv
                                        MD5:8B188186E9CE2FA322FB2105A840CB05
                                        SHA1:A2790381B3684BC2C0F55C20670BF8EB640C4491
                                        SHA-256:ADF243BA29EF2AF4A08368A74B9C23D202BC78B2FA7F748FE9DA283B6A23BA3D
                                        SHA-512:A5A9D5D8AC8BF44B7B4F8B2E363ABB4D9B30DB4B6ADEB71537F8CE87D1F30FEA75526E38D321BD7EB4CBA9F6FE2B4E051178E24D0283ACEE52BD7CA3F3915436
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):1.2482574677831182
                                        Encrypted:false
                                        SSDEEP:48:M90ukYM+CFXJLT5t8sgWfxSCPAECiCytoc+xSCbT8vq:o0nzTTFg8oECGsMv
                                        MD5:30F78ACF3C3FA5BC48BF777EB5AF1543
                                        SHA1:D75BC20E21FF8DCB01DEAF18B4B915B4208990E0
                                        SHA-256:7DA00289B9AB081A703F985336157015238873EAEB231B9E156158F6ED79CE52
                                        SHA-512:B6BB8DB0A3413A20A13D0B8315E34EEE41DB9F49DE793EF2349F711D743A60B22BE569A699A40C943459E36231A6913F77DFCFB35D012C90A8A74A6F66C3F4E8
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):73728
                                        Entropy (8bit):0.13533708846177436
                                        Encrypted:false
                                        SSDEEP:24:FX6Y0BTxkrd/ipVkrdxkrd/ipVkrdBAEVkryjCyqOV2BwGWWTnc+OcY:FqYiTexSCsxSCPAECiCytocwncEY
                                        MD5:FC24EB125316813E9927BA2E1F8B0AA7
                                        SHA1:27BDAFF73EB8D130F32B254561FF09F86D5D8359
                                        SHA-256:743E7FEE9E0FDBC92322E62156506736527AFD404F902049F228ABCE21606F16
                                        SHA-512:DD97C6FCF47FB365F1D261777190AD8D3C2004B28019F3189F00CBA6786BB0866C57B6511E1E6DB619D4C73EFA18EC7707884A651BF342760842F98B48C5EA3D
                                        Malicious:false
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):1.2482574677831182
                                        Encrypted:false
                                        SSDEEP:48:M90ukYM+CFXJLT5t8sgWfxSCPAECiCytoc+xSCbT8vq:o0nzTTFg8oECGsMv
                                        MD5:30F78ACF3C3FA5BC48BF777EB5AF1543
                                        SHA1:D75BC20E21FF8DCB01DEAF18B4B915B4208990E0
                                        SHA-256:7DA00289B9AB081A703F985336157015238873EAEB231B9E156158F6ED79CE52
                                        SHA-512:B6BB8DB0A3413A20A13D0B8315E34EEE41DB9F49DE793EF2349F711D743A60B22BE569A699A40C943459E36231A6913F77DFCFB35D012C90A8A74A6F66C3F4E8
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):0.07125878327599178
                                        Encrypted:false
                                        SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOWMlWtXdDSCvDtgVky6lit/:2F0i8n0itFzDHFWMWtX5SCbZit/
                                        MD5:C971D152B12A93309934AF5EA0A425E1
                                        SHA1:29E0414FAF9CC797730CD01F97527C7826E23428
                                        SHA-256:52A0E51023A651579C1F434C85D4BD83EB8C6B3311F5F0AF0F3D3644087F45CD
                                        SHA-512:69DD95AF4E03261BBC7490A52E3A61BA97B1E02D249159E2BE17CD3920049E2C6F532956CA7EA5B1A0EC8D3755009C6CC33EF9FDABC54838522991A4A4D91171
                                        Malicious:false
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):20480
                                        Entropy (8bit):1.5575378309412877
                                        Encrypted:false
                                        SSDEEP:48:yy8Ph8uRc06WXJ0nT5F8sgWfxSCPAECiCytoc+xSCbT8vq:2h813nT7Fg8oECGsMv
                                        MD5:8B188186E9CE2FA322FB2105A840CB05
                                        SHA1:A2790381B3684BC2C0F55C20670BF8EB640C4491
                                        SHA-256:ADF243BA29EF2AF4A08368A74B9C23D202BC78B2FA7F748FE9DA283B6A23BA3D
                                        SHA-512:A5A9D5D8AC8BF44B7B4F8B2E363ABB4D9B30DB4B6ADEB71537F8CE87D1F30FEA75526E38D321BD7EB4CBA9F6FE2B4E051178E24D0283ACEE52BD7CA3F3915436
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\msiexec.exe
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):32768
                                        Entropy (8bit):1.2482574677831182
                                        Encrypted:false
                                        SSDEEP:48:M90ukYM+CFXJLT5t8sgWfxSCPAECiCytoc+xSCbT8vq:o0nzTTFg8oECGsMv
                                        MD5:30F78ACF3C3FA5BC48BF777EB5AF1543
                                        SHA1:D75BC20E21FF8DCB01DEAF18B4B915B4208990E0
                                        SHA-256:7DA00289B9AB081A703F985336157015238873EAEB231B9E156158F6ED79CE52
                                        SHA-512:B6BB8DB0A3413A20A13D0B8315E34EEE41DB9F49DE793EF2349F711D743A60B22BE569A699A40C943459E36231A6913F77DFCFB35D012C90A8A74A6F66C3F4E8
                                        Malicious:false
                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {70E7C985-4726-4956-A0F5-45A631F7DDEE}, Number of Words: 10, Subject: Microsoft Corporativa, Author: @Klabin, Name of Creating Application: Microsoft Corporativa, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Microsoft Corporativa., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jan 14 00:51:03 2025, Last Saved Time/Date: Tue Jan 14 00:51:03 2025, Last Printed: Tue Jan 14 00:51:03 2025, Number of Pages: 450
                                        Entropy (8bit):7.9673458298105695
                                        TrID:
                                        • Windows SDK Setup Transform Script (63028/2) 47.91%
                                        • Microsoft Windows Installer (60509/1) 46.00%
                                        • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                        File name:2tytrCyNuF.msi
                                        File size:20'951'552 bytes
                                        MD5:8438efc424aca0df22b0987e54ebedf9
                                        SHA1:8f1f9a179a4784d3543c7a476c01181bceb93b18
                                        SHA256:19adf18044aa497dc793d0f117dfb1b68800c93e0cfde82837aa1aecc24bd70e
                                        SHA512:3af72b150ef511391ccb89866bcc55b7d060eb6316b04e8bddc178f57a4efce8dfd4fc637c8e406105d70c0e4a999dd8b227c8bd65411fef98aed6db9018fb5c
                                        SSDEEP:393216:tktwyY0daED8wromlva/UNzoGFaCwn/gRUgTD0Hsc23sfr:tkYcaEQw8mha/UNZFabnekscisfr
                                        TLSH:A2273321A2CBC42AE65D05B7E939FE2E123DBD67073045D3B2F5795A08B08C1A67DB13
                                        File Content Preview:........................>...................@...................................F.......c.......o..............................................................................................................................................................
                                        Icon Hash:2d2e3797b32b2b99
                                        No network behavior found

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:14:35:07
                                        Start date:15/01/2025
                                        Path:C:\Windows\System32\msiexec.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\2tytrCyNuF.msi"
                                        Imagebase:0x7ff678230000
                                        File size:69'632 bytes
                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:1
                                        Start time:14:35:07
                                        Start date:15/01/2025
                                        Path:C:\Windows\System32\msiexec.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\msiexec.exe /V
                                        Imagebase:0x7ff678230000
                                        File size:69'632 bytes
                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:2
                                        Start time:14:35:08
                                        Start date:15/01/2025
                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 7DBAA4AD04C4E7682ABB0AAAF07D1209
                                        Imagebase:0xce0000
                                        File size:59'904 bytes
                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:14:35:11
                                        Start date:15/01/2025
                                        Path:C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe"
                                        Imagebase:0x9f0000
                                        File size:138'520 bytes
                                        MD5 hash:E04F15D35A1807C4D74D2538D5FE28C9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:Borland Delphi
                                        Antivirus matches:
                                        • Detection: 0%, ReversingLabs
                                        • Detection: 0%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:3.7%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:8%
                                          Total number of Nodes:1329
                                          Total number of Limit Nodes:31
                                          execution_graph 8485 9f6f18 8486 9f6f33 8485->8486 8487 9f6f23 8485->8487 8491 9f6f39 8487->8491 8490 9f6b10 _free 20 API calls 8490->8486 8492 9f6f4c 8491->8492 8493 9f6f52 8491->8493 8494 9f6b10 _free 20 API calls 8492->8494 8495 9f6b10 _free 20 API calls 8493->8495 8494->8493 8496 9f6f5e 8495->8496 8497 9f6b10 _free 20 API calls 8496->8497 8498 9f6f69 8497->8498 8499 9f6b10 _free 20 API calls 8498->8499 8500 9f6f74 8499->8500 8501 9f6b10 _free 20 API calls 8500->8501 8502 9f6f7f 8501->8502 8503 9f6b10 _free 20 API calls 8502->8503 8504 9f6f8a 8503->8504 8505 9f6b10 _free 20 API calls 8504->8505 8506 9f6f95 8505->8506 8507 9f6b10 _free 20 API calls 8506->8507 8508 9f6fa0 8507->8508 8509 9f6b10 _free 20 API calls 8508->8509 8510 9f6fab 8509->8510 8511 9f6b10 _free 20 API calls 8510->8511 8512 9f6fb9 8511->8512 8517 9f6dff 8512->8517 8523 9f6d0b 8517->8523 8519 9f6e23 8520 9f6e4f 8519->8520 8536 9f6d6c 8520->8536 8522 9f6e73 8522->8490 8524 9f6d17 ___FrameUnwindToState 8523->8524 8531 9f71be RtlEnterCriticalSection 8524->8531 8526 9f6d21 8529 9f6b10 _free 20 API calls 8526->8529 8530 9f6d4b 8526->8530 8528 9f6d58 ___FrameUnwindToState 8528->8519 8529->8530 8532 9f6d60 8530->8532 8531->8526 8535 9f7206 RtlLeaveCriticalSection 8532->8535 8534 9f6d6a 8534->8528 8535->8534 8537 9f6d78 ___FrameUnwindToState 8536->8537 8544 9f71be RtlEnterCriticalSection 8537->8544 8539 9f6d82 8540 9f6fe3 pre_c_initialization 20 API calls 8539->8540 8541 9f6d95 8540->8541 8545 9f6dab 8541->8545 8543 9f6da3 ___FrameUnwindToState 8543->8522 8544->8539 8548 9f7206 RtlLeaveCriticalSection 8545->8548 8547 9f6db5 8547->8543 8548->8547 8707 9f6430 8708 9f643c ___FrameUnwindToState 8707->8708 8709 9f6473 ___FrameUnwindToState 8708->8709 8715 9f71be RtlEnterCriticalSection 8708->8715 8711 9f6450 8716 9f923a 8711->8716 8715->8711 8717 9f6460 8716->8717 8718 9f9248 __fassign 8716->8718 8720 9f6479 8717->8720 8718->8717 8719 9f8f76 __fassign 20 API calls 8718->8719 8719->8717 8723 9f7206 RtlLeaveCriticalSection 8720->8723 8722 9f6480 8722->8709 8723->8722 6499 9f26af 6500 9f26bb ___FrameUnwindToState 6499->6500 6523 9f2ac3 6500->6523 6502 9f26c2 6504 9f26eb 6502->6504 6564 9f2dc9 IsProcessorFeaturePresent 6502->6564 6512 9f272a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 6504->6512 6568 9f60d8 6504->6568 6508 9f270a ___FrameUnwindToState 6509 9f278a 6534 9f2ee4 6509->6534 6511 9f2790 6538 9f17a0 6511->6538 6512->6509 6576 9f639a 6512->6576 6518 9f27b6 6519 9f27bf 6518->6519 6582 9f6375 6518->6582 6585 9f2c3a 6519->6585 6524 9f2acc 6523->6524 6591 9f305c IsProcessorFeaturePresent 6524->6591 6528 9f2add 6529 9f2ae1 6528->6529 6602 9f69f7 6528->6602 6529->6502 6532 9f2af8 6532->6502 6684 9f4940 6534->6684 6537 9f2f0a 6537->6511 6539 9f17d4 6538->6539 6686 9f1a90 6539->6686 6541 9f183e 6544 9f1847 6541->6544 6545 9f1842 6541->6545 6542 9f181a 6542->6541 6752 9f1c00 6542->6752 6698 9f1000 6544->6698 6757 9f1510 GetModuleFileNameW 6545->6757 6549 9f188e GetProcAddress 6551 9f189e 6549->6551 6552 9f18a8 FreeLibrary 6549->6552 6550 9f186b 6550->6552 6557 9f187d LoadLibraryW 6550->6557 6551->6552 6553 9f18b8 6552->6553 6554 9f18c3 6552->6554 6555 9f1c00 26 API calls 6553->6555 6556 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 6554->6556 6555->6554 6558 9f18d2 6556->6558 6557->6549 6557->6552 6559 9f62a9 GetModuleHandleW 6558->6559 6560 9f27ac 6559->6560 6560->6518 6561 9f63d2 6560->6561 6988 9f614f 6561->6988 6565 9f2ddf ___scrt_fastfail 6564->6565 6566 9f2e87 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6565->6566 6567 9f2ed1 6566->6567 6567->6502 6569 9f60ef 6568->6569 6570 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 6569->6570 6571 9f2704 6570->6571 6571->6508 6572 9f607c 6571->6572 6573 9f60ab 6572->6573 6574 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 6573->6574 6575 9f60d4 6574->6575 6575->6512 6577 9f63c2 pre_c_initialization ___FrameUnwindToState 6576->6577 6577->6509 7085 9f702e GetLastError 6577->7085 6581 9f6a8b 7105 9f6b98 6581->7105 6583 9f614f _abort 28 API calls 6582->6583 6584 9f6380 6583->6584 6584->6519 6586 9f2c46 6585->6586 6590 9f2c5c 6586->6590 7347 9f6a09 6586->7347 6589 9f48df ___vcrt_uninitialize 8 API calls 6589->6590 6590->6508 6592 9f2ad8 6591->6592 6593 9f48b6 6592->6593 6594 9f48bb ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 6593->6594 6613 9f514e 6594->6613 6597 9f48c9 6597->6528 6599 9f48d1 6600 9f48dc 6599->6600 6627 9f518a 6599->6627 6600->6528 6668 9f931d 6602->6668 6605 9f48df 6606 9f48f9 6605->6606 6607 9f48e8 6605->6607 6606->6529 6608 9f4ba5 ___vcrt_uninitialize_ptd 6 API calls 6607->6608 6609 9f48ed 6608->6609 6610 9f518a ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6609->6610 6611 9f48f2 6610->6611 6680 9f5445 6611->6680 6614 9f5157 6613->6614 6616 9f5180 6614->6616 6617 9f48c5 6614->6617 6631 9f53c5 6614->6631 6618 9f518a ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6616->6618 6617->6597 6619 9f4b72 6617->6619 6618->6617 6649 9f52da 6619->6649 6621 9f4b7c 6622 9f4b87 6621->6622 6654 9f5388 6621->6654 6622->6599 6624 9f4b95 6625 9f4ba2 6624->6625 6659 9f4ba5 6624->6659 6625->6599 6628 9f51b4 6627->6628 6629 9f5195 6627->6629 6628->6597 6630 9f519f RtlDeleteCriticalSection 6629->6630 6630->6628 6630->6630 6636 9f51b9 6631->6636 6633 9f53df 6634 9f53fc InitializeCriticalSectionAndSpinCount 6633->6634 6635 9f53e8 6633->6635 6634->6635 6635->6614 6639 9f51e9 6636->6639 6641 9f51ed __crt_fast_encode_pointer 6636->6641 6637 9f520d 6640 9f5219 GetProcAddress 6637->6640 6637->6641 6639->6637 6639->6641 6642 9f5259 6639->6642 6640->6641 6641->6633 6643 9f5281 LoadLibraryExW 6642->6643 6648 9f5276 6642->6648 6644 9f529d GetLastError 6643->6644 6647 9f52b5 6643->6647 6646 9f52a8 LoadLibraryExW 6644->6646 6644->6647 6645 9f52cc FreeLibrary 6645->6648 6646->6647 6647->6645 6647->6648 6648->6639 6650 9f51b9 try_get_function 5 API calls 6649->6650 6651 9f52f4 6650->6651 6652 9f530c TlsAlloc 6651->6652 6653 9f52fd 6651->6653 6653->6621 6655 9f51b9 try_get_function 5 API calls 6654->6655 6656 9f53a2 6655->6656 6657 9f53bc TlsSetValue 6656->6657 6658 9f53b1 6656->6658 6657->6658 6658->6624 6660 9f4baf 6659->6660 6661 9f4bb5 6659->6661 6663 9f5314 6660->6663 6661->6622 6664 9f51b9 try_get_function 5 API calls 6663->6664 6665 9f532e 6664->6665 6666 9f533a 6665->6666 6667 9f5345 TlsFree 6665->6667 6666->6661 6667->6666 6671 9f9336 6668->6671 6670 9f2aea 6670->6532 6670->6605 6672 9f25a8 6671->6672 6673 9f25b3 IsProcessorFeaturePresent 6672->6673 6674 9f25b1 6672->6674 6676 9f285d 6673->6676 6674->6670 6679 9f2821 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6676->6679 6678 9f2940 6678->6670 6679->6678 6681 9f5474 6680->6681 6683 9f544e 6680->6683 6681->6606 6682 9f545e FreeLibrary 6682->6683 6683->6681 6683->6682 6685 9f2ef7 GetStartupInfoW 6684->6685 6685->6537 6687 9f1ae6 6686->6687 6693 9f1a9e 6686->6693 6688 9f1b7e 6687->6688 6689 9f1af6 6687->6689 6807 9f32fa 6688->6807 6690 9f1b06 6689->6690 6794 9f1e40 6689->6794 6690->6542 6693->6687 6695 9f1ac5 6693->6695 6779 9f1d20 6695->6779 6697 9f1ae0 6697->6542 6699 9f1a90 28 API calls 6698->6699 6700 9f106f ___scrt_fastfail 6699->6700 6701 9f1089 SHGetFolderPathW 6700->6701 6703 9f10a9 6701->6703 6719 9f11cf 6701->6719 6702 9f14f1 6705 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 6702->6705 6704 9f1a90 28 API calls 6703->6704 6706 9f1102 6704->6706 6708 9f150b LoadLibraryW 6705->6708 6918 9f20f0 6706->6918 6707 9f1c00 26 API calls 6707->6702 6708->6549 6708->6550 6711 9f1143 6712 9f1188 PathFileExistsW 6711->6712 6714 9f1c00 26 API calls 6711->6714 6715 9f1202 6712->6715 6720 9f11a9 6712->6720 6713 9f1c00 26 API calls 6713->6711 6714->6712 6716 9f20f0 28 API calls 6715->6716 6717 9f1218 6716->6717 6926 9f2200 6717->6926 6719->6702 6719->6707 6720->6719 6722 9f1c00 26 API calls 6720->6722 6722->6719 6723 9f1288 PathFileExistsW 6725 9f12a7 LoadLibraryW 6723->6725 6731 9f141c 6723->6731 6724 9f1256 MoveFileExW 6724->6723 6726 9f12df GetProcAddress 6725->6726 6727 9f1339 6725->6727 6728 9f12eb FreeLibrary 6726->6728 6729 9f1307 FreeLibrary 6726->6729 6730 9f1351 LoadLibraryW 6727->6730 6728->6730 6729->6730 6733 9f137d GetProcAddress 6730->6733 6742 9f13b7 6730->6742 6732 9f1442 6731->6732 6736 9f1c00 26 API calls 6731->6736 6737 9f1477 6732->6737 6739 9f1c00 26 API calls 6732->6739 6734 9f139d FreeLibrary 6733->6734 6735 9f1389 FreeLibrary 6733->6735 6734->6742 6735->6742 6736->6732 6740 9f14ac 6737->6740 6743 9f1c00 26 API calls 6737->6743 6739->6737 6740->6719 6934 9f1920 6742->6934 6743->6740 6746 9f1920 26 API calls 6747 9f13f9 6746->6747 6748 9f1920 26 API calls 6747->6748 6749 9f1404 6748->6749 6750 9f1920 26 API calls 6749->6750 6751 9f140f 6750->6751 6751->6702 6753 9f1c40 6752->6753 6754 9f1c10 6752->6754 6970 9f57b1 6753->6970 6754->6541 6758 9f1578 6757->6758 6759 9f1a90 28 API calls 6758->6759 6760 9f15a7 6759->6760 6985 9f18e0 6760->6985 6763 9f160f 6764 9f1650 GetCurrentProcessId 6763->6764 6766 9f1c00 26 API calls 6763->6766 6776 9f1670 6764->6776 6765 9f1c00 26 API calls 6765->6763 6766->6764 6767 9f1679 CreateToolhelp32Snapshot Process32FirstW 6771 9f16ad Process32NextW 6767->6771 6772 9f173a CloseHandle 6767->6772 6768 9f1754 Sleep 6769 9f176a 6768->6769 6770 9f1777 6768->6770 6774 9f1c00 26 API calls 6769->6774 6773 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 6770->6773 6771->6772 6771->6776 6772->6768 6772->6776 6775 9f178f 6773->6775 6774->6770 6775->6544 6776->6767 6776->6768 6776->6772 6777 9f1717 Process32NextW 6776->6777 6778 9f1728 Sleep 6776->6778 6777->6776 6778->6772 6780 9f1e1c 6779->6780 6781 9f1d39 6779->6781 6817 9f331a 6780->6817 6783 9f1d7a 6781->6783 6786 9f1e26 6781->6786 6787 9f1d53 6781->6787 6784 9f1d86 6783->6784 6785 9f1e30 6783->6785 6791 9f1e40 28 API calls 6784->6791 6793 9f1d96 6784->6793 6789 9f32fa 28 API calls 6785->6789 6788 9f331a 28 API calls 6786->6788 6812 9f1fe0 6787->6812 6788->6785 6792 9f1e3a 6789->6792 6791->6793 6793->6697 6796 9f1e80 6794->6796 6795 9f1ec9 6798 9f1ef2 6795->6798 6799 9f1ed2 6795->6799 6796->6795 6805 9f1eb9 6796->6805 6900 9f32dd 6796->6900 6801 9f25b9 new 22 API calls 6798->6801 6800 9f1ede 6799->6800 6803 9f32dd Concurrency::cancel_current_task RaiseException 6799->6803 6904 9f25b9 6800->6904 6801->6805 6802 9f1c00 26 API calls 6806 9f1f5a 6802->6806 6803->6800 6805->6802 6805->6806 6806->6690 6915 9f3254 6807->6915 6810 9f4848 __CxxThrowException@8 RaiseException 6811 9f3319 6810->6811 6813 9f207d 6812->6813 6816 9f1ff5 ___BuildCatchObject 6812->6816 6814 9f331a 28 API calls 6813->6814 6815 9f2087 6814->6815 6816->6783 6822 9f32ab 6817->6822 6821 9f3339 6828 9f3202 6822->6828 6825 9f4848 6827 9f4868 6825->6827 6826 9f489a RaiseException 6826->6821 6827->6826 6831 9f47c6 6828->6831 6830 9f322e 6830->6825 6832 9f4800 ___std_exception_copy 6831->6832 6833 9f47d3 6831->6833 6832->6830 6833->6832 6837 9f58ab 6833->6837 6839 9f6b4a pre_c_initialization 6837->6839 6838 9f6b88 6858 9f73d2 6838->6858 6839->6838 6841 9f6b73 RtlAllocateHeap 6839->6841 6853 9f5815 6839->6853 6841->6839 6842 9f47f0 6841->6842 6842->6832 6844 9f6ab6 6842->6844 6845 9f6ad1 6844->6845 6846 9f6ac3 6844->6846 6847 9f73d2 __dosmaperr 20 API calls 6845->6847 6846->6845 6850 9f6ae8 6846->6850 6852 9f6ad9 6847->6852 6849 9f6ae3 6849->6832 6850->6849 6851 9f73d2 __dosmaperr 20 API calls 6850->6851 6851->6852 6886 9f57a1 6852->6886 6861 9f5859 6853->6861 6855 9f582b 6856 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 6855->6856 6857 9f5855 6856->6857 6857->6839 6867 9f70b2 GetLastError 6858->6867 6862 9f5865 ___FrameUnwindToState 6861->6862 6863 9f71be _abort RtlEnterCriticalSection 6862->6863 6864 9f5870 6863->6864 6865 9f58a2 new RtlLeaveCriticalSection 6864->6865 6866 9f5897 ___FrameUnwindToState 6865->6866 6866->6855 6868 9f70cb 6867->6868 6869 9f70d1 6867->6869 6870 9f837c pre_c_initialization 11 API calls 6868->6870 6871 9f6bdb pre_c_initialization 17 API calls 6869->6871 6873 9f7128 SetLastError 6869->6873 6870->6869 6872 9f70e3 6871->6872 6874 9f70eb 6872->6874 6875 9f83d2 pre_c_initialization 11 API calls 6872->6875 6876 9f7131 6873->6876 6878 9f6b10 _free 17 API calls 6874->6878 6877 9f7100 6875->6877 6876->6842 6877->6874 6880 9f7107 6877->6880 6879 9f70f1 6878->6879 6881 9f711f SetLastError 6879->6881 6882 9f6e9f pre_c_initialization 17 API calls 6880->6882 6881->6876 6883 9f7112 6882->6883 6884 9f6b10 _free 17 API calls 6883->6884 6885 9f7118 6884->6885 6885->6873 6885->6881 6889 9f5726 6886->6889 6888 9f57ad 6888->6849 6890 9f70b2 __dosmaperr 20 API calls 6889->6890 6891 9f573c 6890->6891 6892 9f579b 6891->6892 6893 9f574a 6891->6893 6894 9f57ce ___std_exception_copy 11 API calls 6892->6894 6898 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 6893->6898 6895 9f57a0 6894->6895 6896 9f5726 ___std_exception_copy 26 API calls 6895->6896 6897 9f57ad 6896->6897 6897->6888 6899 9f5771 6898->6899 6899->6888 6901 9f32eb Concurrency::cancel_current_task 6900->6901 6902 9f4848 __CxxThrowException@8 RaiseException 6901->6902 6903 9f32f9 6902->6903 6906 9f25be 6904->6906 6905 9f58ab ___std_exception_copy 21 API calls 6905->6906 6906->6905 6907 9f25ea 6906->6907 6908 9f5815 new 7 API calls 6906->6908 6910 9f32dd Concurrency::cancel_current_task RaiseException 6906->6910 6911 9f2a03 6906->6911 6907->6805 6908->6906 6910->6906 6912 9f2a11 Concurrency::cancel_current_task 6911->6912 6913 9f4848 __CxxThrowException@8 RaiseException 6912->6913 6914 9f2a1f 6913->6914 6914->6906 6916 9f3202 std::exception::exception 27 API calls 6915->6916 6917 9f3266 6916->6917 6917->6810 6921 9f214b 6918->6921 6919 9f2198 6938 9f24a0 6919->6938 6921->6919 6966 9f1c60 6921->6966 6923 9f21bf 6951 9f2370 6923->6951 6925 9f111c 6925->6711 6925->6713 6928 9f2258 6926->6928 6927 9f228c 6929 9f24a0 28 API calls 6927->6929 6928->6927 6930 9f1c60 28 API calls 6928->6930 6931 9f22b1 6929->6931 6930->6927 6932 9f24a0 28 API calls 6931->6932 6933 9f1234 PathFileExistsW 6932->6933 6933->6723 6933->6724 6935 9f192b 6934->6935 6936 9f13ee 6934->6936 6937 9f1c00 26 API calls 6935->6937 6936->6746 6937->6936 6939 9f2589 6938->6939 6940 9f24b9 6938->6940 6941 9f331a 28 API calls 6939->6941 6942 9f24d5 6940->6942 6943 9f2593 6940->6943 6941->6943 6945 9f259d 6942->6945 6946 9f24ec 6942->6946 6950 9f24fa 6942->6950 6944 9f32fa 28 API calls 6943->6944 6944->6945 6947 9f32fa 28 API calls 6945->6947 6948 9f1e40 28 API calls 6946->6948 6946->6950 6949 9f25a7 6947->6949 6948->6950 6950->6923 6952 9f23c6 6951->6952 6956 9f237e 6951->6956 6953 9f247f 6952->6953 6954 9f23d8 6952->6954 6955 9f32fa 28 API calls 6953->6955 6957 9f2489 6954->6957 6958 9f23f0 6954->6958 6963 9f23fe 6954->6963 6955->6957 6956->6952 6962 9f23a5 6956->6962 6959 9f32fa 28 API calls 6957->6959 6960 9f1e40 28 API calls 6958->6960 6958->6963 6961 9f2493 6959->6961 6960->6963 6964 9f24a0 28 API calls 6962->6964 6963->6925 6965 9f23c0 6964->6965 6965->6925 6967 9f1d11 6966->6967 6968 9f32fa 28 API calls 6967->6968 6969 9f1d1b 6968->6969 6971 9f5726 ___std_exception_copy 26 API calls 6970->6971 6972 9f57c0 6971->6972 6975 9f57ce IsProcessorFeaturePresent 6972->6975 6974 9f57cd 6976 9f57d9 6975->6976 6979 9f55d7 6976->6979 6980 9f55f3 _abort ___scrt_fastfail 6979->6980 6981 9f561f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6980->6981 6983 9f56f0 _abort 6981->6983 6982 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 6984 9f570e GetCurrentProcess TerminateProcess 6982->6984 6983->6982 6984->6974 6986 9f1d20 28 API calls 6985->6986 6987 9f15eb 6986->6987 6987->6763 6987->6765 6989 9f615b ___FrameUnwindToState 6988->6989 6990 9f62a9 _abort GetModuleHandleW 6989->6990 6998 9f6173 6989->6998 6992 9f6167 6990->6992 6992->6998 7022 9f62ed GetModuleHandleExW 6992->7022 6995 9f617b 6997 9f61f0 6995->6997 7007 9f6219 6995->7007 7030 9f6888 6995->7030 7001 9f6208 6997->7001 7006 9f607c _abort 5 API calls 6997->7006 7010 9f71be RtlEnterCriticalSection 6998->7010 6999 9f6236 7014 9f6268 6999->7014 7000 9f6262 7033 9fd559 7000->7033 7002 9f607c _abort 5 API calls 7001->7002 7002->7007 7006->7001 7011 9f6259 7007->7011 7010->6995 7036 9f7206 RtlLeaveCriticalSection 7011->7036 7013 9f6232 7013->6999 7013->7000 7037 9f8597 7014->7037 7017 9f6296 7020 9f62ed _abort 8 API calls 7017->7020 7018 9f6276 GetPEB 7018->7017 7019 9f6286 GetCurrentProcess TerminateProcess 7018->7019 7019->7017 7021 9f629e ExitProcess 7020->7021 7023 9f633a 7022->7023 7024 9f6317 GetProcAddress 7022->7024 7026 9f6349 7023->7026 7027 9f6340 FreeLibrary 7023->7027 7025 9f632c 7024->7025 7025->7023 7028 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7026->7028 7027->7026 7029 9f6353 7028->7029 7029->6998 7057 9f65c1 7030->7057 7034 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7033->7034 7035 9fd564 7034->7035 7035->7035 7036->7013 7038 9f85bc 7037->7038 7042 9f85b2 7037->7042 7043 9f81b9 7038->7043 7040 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7041 9f6272 7040->7041 7041->7017 7041->7018 7042->7040 7044 9f81e9 7043->7044 7046 9f81e5 7043->7046 7044->7042 7045 9f8209 7045->7044 7048 9f8215 GetProcAddress 7045->7048 7046->7044 7046->7045 7050 9f8255 7046->7050 7049 9f8225 __crt_fast_encode_pointer 7048->7049 7049->7044 7051 9f8276 LoadLibraryExW 7050->7051 7055 9f826b 7050->7055 7052 9f82ab 7051->7052 7053 9f8293 GetLastError 7051->7053 7052->7055 7056 9f82c2 FreeLibrary 7052->7056 7053->7052 7054 9f829e LoadLibraryExW 7053->7054 7054->7052 7055->7046 7056->7055 7060 9f6570 7057->7060 7059 9f65e5 7059->6997 7061 9f657c ___FrameUnwindToState 7060->7061 7068 9f71be RtlEnterCriticalSection 7061->7068 7063 9f658a 7069 9f6611 7063->7069 7067 9f65a8 ___FrameUnwindToState 7067->7059 7068->7063 7070 9f6631 7069->7070 7073 9f6639 7069->7073 7071 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7070->7071 7072 9f6597 7071->7072 7075 9f65b5 7072->7075 7073->7070 7078 9f6b10 7073->7078 7084 9f7206 RtlLeaveCriticalSection 7075->7084 7077 9f65bf 7077->7067 7079 9f6b1b HeapFree 7078->7079 7083 9f6b44 __dosmaperr 7078->7083 7080 9f6b30 7079->7080 7079->7083 7081 9f73d2 __dosmaperr 18 API calls 7080->7081 7082 9f6b36 GetLastError 7081->7082 7082->7083 7083->7070 7084->7077 7086 9f7044 7085->7086 7087 9f704a 7085->7087 7116 9f837c 7086->7116 7092 9f7099 SetLastError 7087->7092 7123 9f6bdb 7087->7123 7091 9f7064 7094 9f6b10 _free 20 API calls 7091->7094 7092->6581 7096 9f706a 7094->7096 7098 9f70a5 SetLastError 7096->7098 7097 9f7080 7137 9f6e9f 7097->7137 7100 9f6b98 _abort 35 API calls 7098->7100 7102 9f70b1 7100->7102 7103 9f6b10 _free 20 API calls 7104 9f7092 7103->7104 7104->7092 7104->7098 7290 9f94d9 7105->7290 7109 9f6bd0 7320 9f6384 7109->7320 7110 9f6bb2 IsProcessorFeaturePresent 7112 9f6bbd 7110->7112 7111 9f6ba8 7111->7109 7111->7110 7114 9f55d7 _abort 8 API calls 7112->7114 7114->7109 7117 9f81b9 pre_c_initialization 5 API calls 7116->7117 7118 9f83a3 7117->7118 7119 9f83bb TlsGetValue 7118->7119 7122 9f83af 7118->7122 7119->7122 7120 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7121 9f83cc 7120->7121 7121->7087 7122->7120 7126 9f6be8 pre_c_initialization 7123->7126 7124 9f6c28 7128 9f73d2 __dosmaperr 19 API calls 7124->7128 7125 9f6c13 RtlAllocateHeap 7125->7126 7127 9f6c26 7125->7127 7126->7124 7126->7125 7129 9f5815 new 7 API calls 7126->7129 7127->7091 7130 9f83d2 7127->7130 7128->7127 7129->7126 7131 9f81b9 pre_c_initialization 5 API calls 7130->7131 7132 9f83f9 7131->7132 7133 9f8414 TlsSetValue 7132->7133 7136 9f8408 7132->7136 7133->7136 7134 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7135 9f7079 7134->7135 7135->7091 7135->7097 7136->7134 7142 9f6e77 7137->7142 7148 9f6db7 7142->7148 7144 9f6e9b 7145 9f6e27 7144->7145 7159 9f6cbb 7145->7159 7147 9f6e4b 7147->7103 7149 9f6dc3 ___FrameUnwindToState 7148->7149 7154 9f71be RtlEnterCriticalSection 7149->7154 7151 9f6dcd 7155 9f6df3 7151->7155 7153 9f6deb ___FrameUnwindToState 7153->7144 7154->7151 7158 9f7206 RtlLeaveCriticalSection 7155->7158 7157 9f6dfd 7157->7153 7158->7157 7160 9f6cc7 ___FrameUnwindToState 7159->7160 7167 9f71be RtlEnterCriticalSection 7160->7167 7162 9f6cd1 7168 9f6fe3 7162->7168 7164 9f6ce9 7172 9f6cff 7164->7172 7166 9f6cf7 ___FrameUnwindToState 7166->7147 7167->7162 7169 9f7019 __fassign 7168->7169 7170 9f6ff2 __fassign 7168->7170 7169->7164 7170->7169 7175 9f8f76 7170->7175 7289 9f7206 RtlLeaveCriticalSection 7172->7289 7174 9f6d09 7174->7166 7176 9f8ff6 7175->7176 7179 9f8f8c 7175->7179 7177 9f9044 7176->7177 7180 9f6b10 _free 20 API calls 7176->7180 7243 9f90e9 7177->7243 7179->7176 7182 9f8fbf 7179->7182 7187 9f6b10 _free 20 API calls 7179->7187 7181 9f9018 7180->7181 7183 9f6b10 _free 20 API calls 7181->7183 7184 9f8fe1 7182->7184 7189 9f6b10 _free 20 API calls 7182->7189 7185 9f902b 7183->7185 7186 9f6b10 _free 20 API calls 7184->7186 7188 9f6b10 _free 20 API calls 7185->7188 7190 9f8feb 7186->7190 7192 9f8fb4 7187->7192 7194 9f9039 7188->7194 7195 9f8fd6 7189->7195 7196 9f6b10 _free 20 API calls 7190->7196 7191 9f90b2 7197 9f6b10 _free 20 API calls 7191->7197 7203 9f8af0 7192->7203 7193 9f9052 7193->7191 7201 9f6b10 20 API calls _free 7193->7201 7199 9f6b10 _free 20 API calls 7194->7199 7231 9f8bee 7195->7231 7196->7176 7202 9f90b8 7197->7202 7199->7177 7201->7193 7202->7169 7204 9f8b01 7203->7204 7230 9f8bea 7203->7230 7205 9f8b12 7204->7205 7206 9f6b10 _free 20 API calls 7204->7206 7207 9f8b24 7205->7207 7208 9f6b10 _free 20 API calls 7205->7208 7206->7205 7209 9f6b10 _free 20 API calls 7207->7209 7211 9f8b36 7207->7211 7208->7207 7209->7211 7210 9f8b48 7212 9f8b5a 7210->7212 7214 9f6b10 _free 20 API calls 7210->7214 7211->7210 7213 9f6b10 _free 20 API calls 7211->7213 7215 9f8b6c 7212->7215 7216 9f6b10 _free 20 API calls 7212->7216 7213->7210 7214->7212 7217 9f8b7e 7215->7217 7218 9f6b10 _free 20 API calls 7215->7218 7216->7215 7219 9f8b90 7217->7219 7221 9f6b10 _free 20 API calls 7217->7221 7218->7217 7220 9f8ba2 7219->7220 7222 9f6b10 _free 20 API calls 7219->7222 7223 9f8bb4 7220->7223 7224 9f6b10 _free 20 API calls 7220->7224 7221->7219 7222->7220 7225 9f8bc6 7223->7225 7226 9f6b10 _free 20 API calls 7223->7226 7224->7223 7227 9f8bd8 7225->7227 7228 9f6b10 _free 20 API calls 7225->7228 7226->7225 7229 9f6b10 _free 20 API calls 7227->7229 7227->7230 7228->7227 7229->7230 7230->7182 7232 9f8bfb 7231->7232 7233 9f8c53 7231->7233 7234 9f8c0b 7232->7234 7235 9f6b10 _free 20 API calls 7232->7235 7233->7184 7236 9f8c1d 7234->7236 7237 9f6b10 _free 20 API calls 7234->7237 7235->7234 7238 9f8c2f 7236->7238 7240 9f6b10 _free 20 API calls 7236->7240 7237->7236 7239 9f8c41 7238->7239 7241 9f6b10 _free 20 API calls 7238->7241 7239->7233 7242 9f6b10 _free 20 API calls 7239->7242 7240->7238 7241->7239 7242->7233 7244 9f9114 7243->7244 7245 9f90f6 7243->7245 7244->7193 7245->7244 7249 9f8c93 7245->7249 7248 9f6b10 _free 20 API calls 7248->7244 7250 9f8d71 7249->7250 7251 9f8ca4 7249->7251 7250->7248 7285 9f8c57 7251->7285 7254 9f8c57 __fassign 20 API calls 7255 9f8cb7 7254->7255 7256 9f8c57 __fassign 20 API calls 7255->7256 7257 9f8cc2 7256->7257 7258 9f8c57 __fassign 20 API calls 7257->7258 7259 9f8ccd 7258->7259 7260 9f8c57 __fassign 20 API calls 7259->7260 7261 9f8cdb 7260->7261 7262 9f6b10 _free 20 API calls 7261->7262 7263 9f8ce6 7262->7263 7264 9f6b10 _free 20 API calls 7263->7264 7265 9f8cf1 7264->7265 7266 9f6b10 _free 20 API calls 7265->7266 7267 9f8cfc 7266->7267 7268 9f8c57 __fassign 20 API calls 7267->7268 7269 9f8d0a 7268->7269 7270 9f8c57 __fassign 20 API calls 7269->7270 7271 9f8d18 7270->7271 7272 9f8c57 __fassign 20 API calls 7271->7272 7273 9f8d29 7272->7273 7274 9f8c57 __fassign 20 API calls 7273->7274 7275 9f8d37 7274->7275 7276 9f8c57 __fassign 20 API calls 7275->7276 7277 9f8d45 7276->7277 7278 9f6b10 _free 20 API calls 7277->7278 7279 9f8d50 7278->7279 7280 9f6b10 _free 20 API calls 7279->7280 7281 9f8d5b 7280->7281 7282 9f6b10 _free 20 API calls 7281->7282 7283 9f8d66 7282->7283 7284 9f6b10 _free 20 API calls 7283->7284 7284->7250 7286 9f8c8e 7285->7286 7287 9f8c7e 7285->7287 7286->7254 7287->7286 7288 9f6b10 _free 20 API calls 7287->7288 7288->7287 7289->7174 7323 9f9447 7290->7323 7293 9f9534 7294 9f9540 ___FrameUnwindToState 7293->7294 7295 9f70b2 __dosmaperr 20 API calls 7294->7295 7298 9f956d _abort 7294->7298 7301 9f9567 _abort 7294->7301 7295->7301 7296 9f95b9 7297 9f73d2 __dosmaperr 20 API calls 7296->7297 7299 9f95be 7297->7299 7305 9f95e5 7298->7305 7337 9f71be RtlEnterCriticalSection 7298->7337 7302 9f57a1 ___std_exception_copy 26 API calls 7299->7302 7300 9fd559 _abort 5 API calls 7304 9f973b 7300->7304 7301->7296 7301->7298 7319 9f959c 7301->7319 7302->7319 7304->7111 7306 9f9644 7305->7306 7308 9f963c 7305->7308 7316 9f966f 7305->7316 7338 9f7206 RtlLeaveCriticalSection 7305->7338 7306->7316 7339 9f952b 7306->7339 7311 9f6384 _abort 28 API calls 7308->7311 7311->7306 7313 9f702e pre_c_initialization 38 API calls 7317 9f96d2 7313->7317 7315 9f952b _abort 38 API calls 7315->7316 7342 9f96f4 7316->7342 7318 9f702e pre_c_initialization 38 API calls 7317->7318 7317->7319 7318->7319 7319->7300 7321 9f614f _abort 28 API calls 7320->7321 7322 9f6395 7321->7322 7326 9f93ed 7323->7326 7325 9f6b9d 7325->7111 7325->7293 7327 9f93f9 ___FrameUnwindToState 7326->7327 7332 9f71be RtlEnterCriticalSection 7327->7332 7329 9f9407 7333 9f943b 7329->7333 7331 9f942e ___FrameUnwindToState 7331->7325 7332->7329 7336 9f7206 RtlLeaveCriticalSection 7333->7336 7335 9f9445 7335->7331 7336->7335 7337->7305 7338->7308 7340 9f702e pre_c_initialization 38 API calls 7339->7340 7341 9f9530 7340->7341 7341->7315 7343 9f96fa 7342->7343 7345 9f96c3 7342->7345 7346 9f7206 RtlLeaveCriticalSection 7343->7346 7345->7313 7345->7317 7345->7319 7346->7345 7350 9f93a0 7347->7350 7352 9f93b9 7350->7352 7351 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7353 9f2c54 7351->7353 7352->7351 7353->6589 7676 9f9dde 7686 9fa82e 7676->7686 7680 9f9deb 7699 9fab0a 7680->7699 7683 9f9e15 7684 9f6b10 _free 20 API calls 7683->7684 7685 9f9e20 7684->7685 7703 9fa837 7686->7703 7688 9f9de6 7689 9faa6a 7688->7689 7690 9faa76 ___FrameUnwindToState 7689->7690 7723 9f71be RtlEnterCriticalSection 7690->7723 7692 9faaec 7737 9fab01 7692->7737 7694 9faac0 RtlDeleteCriticalSection 7696 9f6b10 _free 20 API calls 7694->7696 7697 9faa81 7696->7697 7697->7692 7697->7694 7724 9fb89c 7697->7724 7698 9faaf8 ___FrameUnwindToState 7698->7680 7700 9f9dfa RtlDeleteCriticalSection 7699->7700 7701 9fab20 7699->7701 7700->7680 7700->7683 7701->7700 7702 9f6b10 _free 20 API calls 7701->7702 7702->7700 7704 9fa843 ___FrameUnwindToState 7703->7704 7713 9f71be RtlEnterCriticalSection 7704->7713 7706 9fa8e6 7718 9fa906 7706->7718 7709 9fa852 7709->7706 7712 9fa7e7 66 API calls 7709->7712 7714 9f9e2a RtlEnterCriticalSection 7709->7714 7715 9fa8dc 7709->7715 7710 9fa8f2 ___FrameUnwindToState 7710->7688 7712->7709 7713->7709 7714->7709 7721 9f9e3e RtlLeaveCriticalSection 7715->7721 7717 9fa8e4 7717->7709 7722 9f7206 RtlLeaveCriticalSection 7718->7722 7720 9fa90d 7720->7710 7721->7717 7722->7720 7723->7697 7725 9fb8a8 ___FrameUnwindToState 7724->7725 7726 9fb8ce 7725->7726 7727 9fb8b9 7725->7727 7736 9fb8c9 ___FrameUnwindToState 7726->7736 7740 9f9e2a RtlEnterCriticalSection 7726->7740 7728 9f73d2 __dosmaperr 20 API calls 7727->7728 7730 9fb8be 7728->7730 7732 9f57a1 ___std_exception_copy 26 API calls 7730->7732 7731 9fb8ea 7741 9fb826 7731->7741 7732->7736 7734 9fb8f5 7757 9fb912 7734->7757 7736->7697 8021 9f7206 RtlLeaveCriticalSection 7737->8021 7739 9fab08 7739->7698 7740->7731 7742 9fb848 7741->7742 7743 9fb833 7741->7743 7750 9fb843 7742->7750 7760 9fa781 7742->7760 7744 9f73d2 __dosmaperr 20 API calls 7743->7744 7746 9fb838 7744->7746 7748 9f57a1 ___std_exception_copy 26 API calls 7746->7748 7748->7750 7749 9fab0a 20 API calls 7751 9fb864 7749->7751 7750->7734 7766 9f9cf0 7751->7766 7753 9fb86a 7773 9fc5ce 7753->7773 7756 9f6b10 _free 20 API calls 7756->7750 8020 9f9e3e RtlLeaveCriticalSection 7757->8020 7759 9fb91a 7759->7736 7761 9fa799 7760->7761 7762 9fa795 7760->7762 7761->7762 7763 9f9cf0 26 API calls 7761->7763 7762->7749 7764 9fa7b9 7763->7764 7788 9fb223 7764->7788 7767 9f9cfc 7766->7767 7768 9f9d11 7766->7768 7769 9f73d2 __dosmaperr 20 API calls 7767->7769 7768->7753 7770 9f9d01 7769->7770 7771 9f57a1 ___std_exception_copy 26 API calls 7770->7771 7772 9f9d0c 7771->7772 7772->7753 7774 9fc5dd 7773->7774 7779 9fc5f2 7773->7779 7775 9f73bf __dosmaperr 20 API calls 7774->7775 7778 9fc5e2 7775->7778 7776 9fc62d 7777 9f73bf __dosmaperr 20 API calls 7776->7777 7780 9fc632 7777->7780 7781 9f73d2 __dosmaperr 20 API calls 7778->7781 7779->7776 7782 9fc619 7779->7782 7783 9f73d2 __dosmaperr 20 API calls 7780->7783 7786 9fb870 7781->7786 7977 9fc5a6 7782->7977 7785 9fc63a 7783->7785 7787 9f57a1 ___std_exception_copy 26 API calls 7785->7787 7786->7750 7786->7756 7787->7786 7789 9fb22f ___FrameUnwindToState 7788->7789 7790 9fb24f 7789->7790 7791 9fb237 7789->7791 7793 9fb2ed 7790->7793 7798 9fb284 7790->7798 7813 9f73bf 7791->7813 7795 9f73bf __dosmaperr 20 API calls 7793->7795 7797 9fb2f2 7795->7797 7796 9f73d2 __dosmaperr 20 API calls 7799 9fb244 ___FrameUnwindToState 7796->7799 7800 9f73d2 __dosmaperr 20 API calls 7797->7800 7816 9f879b RtlEnterCriticalSection 7798->7816 7799->7762 7802 9fb2fa 7800->7802 7804 9f57a1 ___std_exception_copy 26 API calls 7802->7804 7803 9fb28a 7805 9fb2bb 7803->7805 7806 9fb2a6 7803->7806 7804->7799 7817 9fb30e 7805->7817 7808 9f73d2 __dosmaperr 20 API calls 7806->7808 7809 9fb2ab 7808->7809 7810 9f73bf __dosmaperr 20 API calls 7809->7810 7811 9fb2b6 7810->7811 7868 9fb2e5 7811->7868 7814 9f70b2 __dosmaperr 20 API calls 7813->7814 7815 9f73c4 7814->7815 7815->7796 7816->7803 7818 9fb33c 7817->7818 7855 9fb335 7817->7855 7819 9fb35f 7818->7819 7820 9fb340 7818->7820 7824 9fb3b0 7819->7824 7825 9fb393 7819->7825 7821 9f73bf __dosmaperr 20 API calls 7820->7821 7823 9fb345 7821->7823 7822 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7826 9fb516 7822->7826 7827 9f73d2 __dosmaperr 20 API calls 7823->7827 7828 9fb3c6 7824->7828 7871 9fb80b 7824->7871 7829 9f73bf __dosmaperr 20 API calls 7825->7829 7826->7811 7830 9fb34c 7827->7830 7874 9faeb3 7828->7874 7833 9fb398 7829->7833 7834 9f57a1 ___std_exception_copy 26 API calls 7830->7834 7836 9f73d2 __dosmaperr 20 API calls 7833->7836 7834->7855 7839 9fb3a0 7836->7839 7837 9fb40d 7841 9fb467 WriteFile 7837->7841 7842 9fb421 7837->7842 7838 9fb3d4 7843 9fb3fa 7838->7843 7844 9fb3d8 7838->7844 7840 9f57a1 ___std_exception_copy 26 API calls 7839->7840 7840->7855 7845 9fb48a GetLastError 7841->7845 7850 9fb3f0 7841->7850 7847 9fb429 7842->7847 7848 9fb457 7842->7848 7886 9fac93 GetConsoleCP 7843->7886 7849 9fb4ce 7844->7849 7881 9fae46 7844->7881 7845->7850 7851 9fb42e 7847->7851 7852 9fb447 7847->7852 7912 9faf29 7848->7912 7849->7855 7856 9f73d2 __dosmaperr 20 API calls 7849->7856 7850->7849 7850->7855 7859 9fb4aa 7850->7859 7851->7849 7897 9fb008 7851->7897 7904 9fb0f6 7852->7904 7855->7822 7858 9fb4f3 7856->7858 7861 9f73bf __dosmaperr 20 API calls 7858->7861 7862 9fb4c5 7859->7862 7863 9fb4b1 7859->7863 7861->7855 7919 9f739c 7862->7919 7864 9f73d2 __dosmaperr 20 API calls 7863->7864 7866 9fb4b6 7864->7866 7867 9f73bf __dosmaperr 20 API calls 7866->7867 7867->7855 7976 9f87be RtlLeaveCriticalSection 7868->7976 7870 9fb2eb 7870->7799 7924 9fb78d 7871->7924 7946 9fa72b 7874->7946 7876 9faec3 7877 9faec8 7876->7877 7878 9f702e pre_c_initialization 38 API calls 7876->7878 7877->7837 7877->7838 7879 9faeeb 7878->7879 7879->7877 7880 9faf09 GetConsoleMode 7879->7880 7880->7877 7883 9fae6b 7881->7883 7885 9faea0 7881->7885 7882 9faea2 GetLastError 7882->7885 7883->7882 7884 9fb981 WriteConsoleW CreateFileW 7883->7884 7883->7885 7884->7883 7885->7850 7887 9facf6 7886->7887 7892 9fae08 7886->7892 7891 9fad7c WideCharToMultiByte 7887->7891 7887->7892 7894 9f9c7c 40 API calls __fassign 7887->7894 7896 9fadd3 WriteFile 7887->7896 7955 9f8aca 7887->7955 7888 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7890 9fae42 7888->7890 7890->7850 7891->7892 7893 9fada2 WriteFile 7891->7893 7892->7888 7893->7887 7895 9fae2b GetLastError 7893->7895 7894->7887 7895->7892 7896->7887 7896->7895 7901 9fb017 7897->7901 7898 9fb0d9 7900 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7898->7900 7899 9fb095 WriteFile 7899->7901 7902 9fb0db GetLastError 7899->7902 7903 9fb0f2 7900->7903 7901->7898 7901->7899 7902->7898 7903->7850 7909 9fb105 7904->7909 7905 9fb210 7906 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7905->7906 7908 9fb21f 7906->7908 7907 9fb187 WideCharToMultiByte 7910 9fb1bc WriteFile 7907->7910 7911 9fb208 GetLastError 7907->7911 7908->7850 7909->7905 7909->7907 7909->7910 7910->7909 7910->7911 7911->7905 7916 9faf38 7912->7916 7913 9fafeb 7915 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 7913->7915 7914 9fafaa WriteFile 7914->7916 7917 9fafed GetLastError 7914->7917 7918 9fb004 7915->7918 7916->7913 7916->7914 7917->7913 7918->7850 7920 9f73bf __dosmaperr 20 API calls 7919->7920 7921 9f73a7 __dosmaperr 7920->7921 7922 9f73d2 __dosmaperr 20 API calls 7921->7922 7923 9f73ba 7922->7923 7923->7855 7933 9f8872 7924->7933 7926 9fb79f 7927 9fb7b8 SetFilePointerEx 7926->7927 7928 9fb7a7 7926->7928 7930 9fb7d0 GetLastError 7927->7930 7932 9fb7ac 7927->7932 7929 9f73d2 __dosmaperr 20 API calls 7928->7929 7929->7932 7931 9f739c __dosmaperr 20 API calls 7930->7931 7931->7932 7932->7828 7934 9f887f 7933->7934 7935 9f8894 7933->7935 7936 9f73bf __dosmaperr 20 API calls 7934->7936 7937 9f73bf __dosmaperr 20 API calls 7935->7937 7939 9f88b9 7935->7939 7938 9f8884 7936->7938 7940 9f88c4 7937->7940 7941 9f73d2 __dosmaperr 20 API calls 7938->7941 7939->7926 7942 9f73d2 __dosmaperr 20 API calls 7940->7942 7943 9f888c 7941->7943 7944 9f88cc 7942->7944 7943->7926 7945 9f57a1 ___std_exception_copy 26 API calls 7944->7945 7945->7943 7947 9fa738 7946->7947 7949 9fa745 7946->7949 7948 9f73d2 __dosmaperr 20 API calls 7947->7948 7950 9fa73d 7948->7950 7951 9fa751 7949->7951 7952 9f73d2 __dosmaperr 20 API calls 7949->7952 7950->7876 7951->7876 7953 9fa772 7952->7953 7954 9f57a1 ___std_exception_copy 26 API calls 7953->7954 7954->7950 7956 9f702e pre_c_initialization 38 API calls 7955->7956 7957 9f8ad5 7956->7957 7960 9f9c96 7957->7960 7961 9f9ca9 7960->7961 7963 9f8ae5 7960->7963 7961->7963 7964 9f91c3 7961->7964 7963->7887 7965 9f91cf ___FrameUnwindToState 7964->7965 7966 9f702e pre_c_initialization 38 API calls 7965->7966 7967 9f91d8 7966->7967 7968 9f9226 ___FrameUnwindToState 7967->7968 7969 9f71be _abort RtlEnterCriticalSection 7967->7969 7968->7963 7970 9f91f6 7969->7970 7971 9f923a __fassign 20 API calls 7970->7971 7972 9f920a 7971->7972 7973 9f9229 __fassign RtlLeaveCriticalSection 7972->7973 7974 9f921d 7973->7974 7974->7968 7975 9f6b98 _abort 38 API calls 7974->7975 7975->7968 7976->7870 7980 9fc524 7977->7980 7979 9fc5ca 7979->7786 7981 9fc530 ___FrameUnwindToState 7980->7981 7991 9f879b RtlEnterCriticalSection 7981->7991 7983 9fc53e 7984 9fc565 7983->7984 7985 9fc570 7983->7985 7992 9fc64d 7984->7992 7987 9f73d2 __dosmaperr 20 API calls 7985->7987 7988 9fc56b 7987->7988 8007 9fc59a 7988->8007 7990 9fc58d ___FrameUnwindToState 7990->7979 7991->7983 7993 9f8872 26 API calls 7992->7993 7995 9fc65d 7993->7995 7994 9fc663 8010 9f87e1 7994->8010 7995->7994 7997 9fc695 7995->7997 8000 9f8872 26 API calls 7995->8000 7997->7994 7998 9f8872 26 API calls 7997->7998 8001 9fc6a1 CloseHandle 7998->8001 8003 9fc68c 8000->8003 8001->7994 8005 9fc6ad GetLastError 8001->8005 8002 9fc6dd 8002->7988 8004 9f8872 26 API calls 8003->8004 8004->7997 8005->7994 8006 9f739c __dosmaperr 20 API calls 8006->8002 8019 9f87be RtlLeaveCriticalSection 8007->8019 8009 9fc5a4 8009->7990 8011 9f8857 8010->8011 8012 9f87f0 8010->8012 8013 9f73d2 __dosmaperr 20 API calls 8011->8013 8012->8011 8018 9f881a 8012->8018 8014 9f885c 8013->8014 8015 9f73bf __dosmaperr 20 API calls 8014->8015 8016 9f8847 8015->8016 8016->8002 8016->8006 8017 9f8841 SetStdHandle 8017->8016 8018->8016 8018->8017 8019->8009 8020->7759 8021->7739 8749 9f8a48 8750 9f8a54 ___FrameUnwindToState 8749->8750 8761 9f71be RtlEnterCriticalSection 8750->8761 8752 9f8a5b 8762 9f8703 8752->8762 8754 9f8a6a 8755 9f8a79 8754->8755 8775 9f88dc GetStartupInfoW 8754->8775 8786 9f8a95 8755->8786 8758 9f8a8a ___FrameUnwindToState 8761->8752 8763 9f870f ___FrameUnwindToState 8762->8763 8764 9f871c 8763->8764 8765 9f8733 8763->8765 8766 9f73d2 __dosmaperr 20 API calls 8764->8766 8789 9f71be RtlEnterCriticalSection 8765->8789 8768 9f8721 8766->8768 8769 9f57a1 ___std_exception_copy 26 API calls 8768->8769 8771 9f872b ___FrameUnwindToState 8769->8771 8770 9f876b 8797 9f8792 8770->8797 8771->8754 8772 9f873f 8772->8770 8790 9f8654 8772->8790 8776 9f898b 8775->8776 8777 9f88f9 8775->8777 8781 9f8992 8776->8781 8777->8776 8778 9f8703 27 API calls 8777->8778 8779 9f8922 8778->8779 8779->8776 8780 9f8950 GetFileType 8779->8780 8780->8779 8783 9f8999 8781->8783 8782 9f89dc GetStdHandle 8782->8783 8783->8782 8784 9f8a44 8783->8784 8785 9f89ef GetFileType 8783->8785 8784->8755 8785->8783 8801 9f7206 RtlLeaveCriticalSection 8786->8801 8788 9f8a9c 8788->8758 8789->8772 8791 9f6bdb pre_c_initialization 20 API calls 8790->8791 8793 9f8666 8791->8793 8792 9f8673 8794 9f6b10 _free 20 API calls 8792->8794 8793->8792 8795 9f842b 11 API calls 8793->8795 8796 9f86c5 8794->8796 8795->8793 8796->8772 8800 9f7206 RtlLeaveCriticalSection 8797->8800 8799 9f8799 8799->8771 8800->8799 8801->8788 8113 9f25f1 8114 9f25f9 pre_c_initialization 8113->8114 8131 9f63e8 8114->8131 8116 9f2604 pre_c_initialization 8138 9f2afc 8116->8138 8118 9f2619 __RTC_Initialize 8119 9f268d 8118->8119 8143 9f2c9d 8118->8143 8120 9f2dc9 ___scrt_fastfail 4 API calls 8119->8120 8121 9f2694 ___scrt_initialize_default_local_stdio_options 8120->8121 8123 9f2632 pre_c_initialization 8123->8119 8124 9f2643 8123->8124 8146 9f2d5b RtlInitializeSListHead 8124->8146 8126 9f2648 pre_c_initialization ___InternalCxxFrameHandler 8147 9f2d67 8126->8147 8128 9f266b pre_c_initialization 8153 9f6482 8128->8153 8130 9f2676 pre_c_initialization 8132 9f641a 8131->8132 8133 9f63f7 8131->8133 8132->8116 8133->8132 8134 9f73d2 __dosmaperr 20 API calls 8133->8134 8135 9f640a 8134->8135 8136 9f57a1 ___std_exception_copy 26 API calls 8135->8136 8137 9f6415 8136->8137 8137->8116 8139 9f2b0a 8138->8139 8142 9f2b0f ___scrt_initialize_onexit_tables ___scrt_release_startup_lock 8138->8142 8140 9f2dc9 ___scrt_fastfail 4 API calls 8139->8140 8139->8142 8141 9f2b92 8140->8141 8142->8118 8160 9f2c62 8143->8160 8146->8126 8233 9f6a1b 8147->8233 8149 9f2d78 8150 9f2d7f 8149->8150 8151 9f2dc9 ___scrt_fastfail 4 API calls 8149->8151 8150->8128 8152 9f2d87 8151->8152 8154 9f702e pre_c_initialization 38 API calls 8153->8154 8155 9f648d 8154->8155 8156 9f64c5 8155->8156 8157 9f73d2 __dosmaperr 20 API calls 8155->8157 8156->8130 8158 9f64ba 8157->8158 8159 9f57a1 ___std_exception_copy 26 API calls 8158->8159 8159->8156 8161 9f2c7f 8160->8161 8162 9f2c86 8160->8162 8166 9f6872 8161->8166 8169 9f68e2 8162->8169 8165 9f2c84 8165->8123 8167 9f68e2 __onexit 29 API calls 8166->8167 8168 9f6884 8167->8168 8168->8165 8172 9f65e9 8169->8172 8175 9f651f 8172->8175 8174 9f660d 8174->8165 8176 9f652b ___FrameUnwindToState 8175->8176 8183 9f71be RtlEnterCriticalSection 8176->8183 8178 9f6539 8184 9f6731 8178->8184 8180 9f6546 8194 9f6564 8180->8194 8182 9f6557 ___FrameUnwindToState 8182->8174 8183->8178 8185 9f674f 8184->8185 8192 9f6747 pre_c_initialization __crt_fast_encode_pointer 8184->8192 8186 9f67a8 8185->8186 8185->8192 8197 9f928a 8185->8197 8188 9f928a __onexit 29 API calls 8186->8188 8186->8192 8190 9f67be 8188->8190 8189 9f679e 8191 9f6b10 _free 20 API calls 8189->8191 8193 9f6b10 _free 20 API calls 8190->8193 8191->8186 8192->8180 8193->8192 8232 9f7206 RtlLeaveCriticalSection 8194->8232 8196 9f656e 8196->8182 8198 9f9295 8197->8198 8199 9f92bd 8198->8199 8200 9f92ae 8198->8200 8201 9f92cc 8199->8201 8206 9fa68f 8199->8206 8202 9f73d2 __dosmaperr 20 API calls 8200->8202 8213 9fa6c2 8201->8213 8205 9f92b3 ___scrt_fastfail 8202->8205 8205->8189 8207 9fa6af RtlSizeHeap 8206->8207 8208 9fa69a 8206->8208 8207->8201 8209 9f73d2 __dosmaperr 20 API calls 8208->8209 8210 9fa69f 8209->8210 8211 9f57a1 ___std_exception_copy 26 API calls 8210->8211 8212 9fa6aa 8211->8212 8212->8201 8214 9fa6cf 8213->8214 8215 9fa6da 8213->8215 8225 9f6b4a 8214->8225 8217 9fa6e2 8215->8217 8223 9fa6eb pre_c_initialization 8215->8223 8218 9f6b10 _free 20 API calls 8217->8218 8221 9fa6d7 8218->8221 8219 9fa715 RtlReAllocateHeap 8219->8221 8219->8223 8220 9fa6f0 8222 9f73d2 __dosmaperr 20 API calls 8220->8222 8221->8205 8222->8221 8223->8219 8223->8220 8224 9f5815 new 7 API calls 8223->8224 8224->8223 8226 9f6b88 8225->8226 8230 9f6b58 pre_c_initialization 8225->8230 8227 9f73d2 __dosmaperr 20 API calls 8226->8227 8229 9f6b86 8227->8229 8228 9f6b73 RtlAllocateHeap 8228->8229 8228->8230 8229->8221 8230->8226 8230->8228 8231 9f5815 new 7 API calls 8230->8231 8231->8230 8232->8196 8234 9f6a39 pre_c_initialization 8233->8234 8238 9f6a59 pre_c_initialization 8233->8238 8235 9f73d2 __dosmaperr 20 API calls 8234->8235 8236 9f6a4f 8235->8236 8237 9f57a1 ___std_exception_copy 26 API calls 8236->8237 8237->8238 8238->8149 8275 9f7de5 8278 9f7ce3 8275->8278 8279 9f702e pre_c_initialization 38 API calls 8278->8279 8280 9f7cf0 8279->8280 8298 9f7e02 8280->8298 8282 9f7cf8 8307 9f7a77 8282->8307 8285 9f7d0f 8286 9f6b4a __onexit 21 API calls 8287 9f7d20 8286->8287 8293 9f7d52 8287->8293 8314 9f7ea4 8287->8314 8290 9f6b10 _free 20 API calls 8290->8285 8291 9f7d4d 8292 9f73d2 __dosmaperr 20 API calls 8291->8292 8292->8293 8293->8290 8294 9f7d6a 8295 9f6b10 _free 20 API calls 8294->8295 8296 9f7d96 8294->8296 8295->8296 8296->8293 8324 9f794d 8296->8324 8299 9f7e0e ___FrameUnwindToState 8298->8299 8300 9f702e pre_c_initialization 38 API calls 8299->8300 8305 9f7e18 8300->8305 8302 9f7e9c ___FrameUnwindToState 8302->8282 8304 9f6b98 _abort 38 API calls 8304->8305 8305->8302 8305->8304 8306 9f6b10 _free 20 API calls 8305->8306 8327 9f71be RtlEnterCriticalSection 8305->8327 8328 9f7e93 8305->8328 8306->8305 8332 9f6c38 8307->8332 8310 9f7aaa 8312 9f7aaf GetACP 8310->8312 8313 9f7ac1 8310->8313 8311 9f7a98 GetOEMCP 8311->8313 8312->8313 8313->8285 8313->8286 8315 9f7a77 40 API calls 8314->8315 8316 9f7ec3 8315->8316 8319 9f7f14 IsValidCodePage 8316->8319 8321 9f7eca 8316->8321 8323 9f7f39 ___scrt_fastfail 8316->8323 8317 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 8318 9f7d45 8317->8318 8318->8291 8318->8294 8320 9f7f26 GetCPInfo 8319->8320 8319->8321 8320->8321 8320->8323 8321->8317 8344 9f7b4f GetCPInfo 8323->8344 8417 9f790a 8324->8417 8326 9f7971 8326->8293 8327->8305 8331 9f7206 RtlLeaveCriticalSection 8328->8331 8330 9f7e9a 8330->8305 8331->8330 8333 9f6c4b 8332->8333 8334 9f6c55 8332->8334 8333->8310 8333->8311 8334->8333 8335 9f702e pre_c_initialization 38 API calls 8334->8335 8336 9f6c76 8335->8336 8337 9f9c96 __fassign 38 API calls 8336->8337 8338 9f6c8f 8337->8338 8340 9f9cc3 8338->8340 8341 9f9ceb 8340->8341 8342 9f9cd6 8340->8342 8341->8333 8342->8341 8343 9f7e02 __fassign 38 API calls 8342->8343 8343->8341 8349 9f7b89 8344->8349 8353 9f7c33 8344->8353 8347 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 8348 9f7cdf 8347->8348 8348->8321 8354 9f8dbc 8349->8354 8352 9fa55c 43 API calls 8352->8353 8353->8347 8355 9f6c38 __fassign 38 API calls 8354->8355 8357 9f8ddc MultiByteToWideChar 8355->8357 8358 9f8e1a 8357->8358 8359 9f8eb2 8357->8359 8361 9f6b4a __onexit 21 API calls 8358->8361 8365 9f8e3b __alloca_probe_16 ___scrt_fastfail 8358->8365 8360 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 8359->8360 8362 9f7bea 8360->8362 8361->8365 8368 9fa55c 8362->8368 8363 9f8eac 8373 9f8ed9 8363->8373 8365->8363 8366 9f8e80 MultiByteToWideChar 8365->8366 8366->8363 8367 9f8e9c GetStringTypeW 8366->8367 8367->8363 8369 9f6c38 __fassign 38 API calls 8368->8369 8370 9fa56f 8369->8370 8377 9fa33f 8370->8377 8374 9f8ef6 8373->8374 8375 9f8ee5 8373->8375 8374->8359 8375->8374 8376 9f6b10 _free 20 API calls 8375->8376 8376->8374 8378 9fa35a 8377->8378 8379 9fa380 MultiByteToWideChar 8378->8379 8380 9fa3aa 8379->8380 8381 9fa534 8379->8381 8384 9f6b4a __onexit 21 API calls 8380->8384 8386 9fa3cb __alloca_probe_16 8380->8386 8382 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 8381->8382 8383 9f7c0b 8382->8383 8383->8352 8384->8386 8385 9fa414 MultiByteToWideChar 8387 9fa42d 8385->8387 8403 9fa480 8385->8403 8386->8385 8386->8403 8404 9f848d 8387->8404 8389 9f8ed9 __freea 20 API calls 8389->8381 8391 9fa48f 8393 9fa4b0 __alloca_probe_16 8391->8393 8396 9f6b4a __onexit 21 API calls 8391->8396 8392 9fa457 8394 9f848d 11 API calls 8392->8394 8392->8403 8395 9fa525 8393->8395 8397 9f848d 11 API calls 8393->8397 8394->8403 8398 9f8ed9 __freea 20 API calls 8395->8398 8396->8393 8399 9fa504 8397->8399 8398->8403 8399->8395 8400 9fa513 WideCharToMultiByte 8399->8400 8400->8395 8401 9fa553 8400->8401 8402 9f8ed9 __freea 20 API calls 8401->8402 8402->8403 8403->8389 8405 9f81b9 pre_c_initialization 5 API calls 8404->8405 8406 9f84b4 8405->8406 8409 9f84bd 8406->8409 8412 9f8515 8406->8412 8410 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 8409->8410 8411 9f850f 8410->8411 8411->8391 8411->8392 8411->8403 8413 9f81b9 pre_c_initialization 5 API calls 8412->8413 8414 9f853c 8413->8414 8415 9f25a8 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 8414->8415 8416 9f84fd LCMapStringW 8415->8416 8416->8409 8418 9f7916 ___FrameUnwindToState 8417->8418 8425 9f71be RtlEnterCriticalSection 8418->8425 8420 9f7920 8426 9f7975 8420->8426 8424 9f7939 ___FrameUnwindToState 8424->8326 8425->8420 8438 9f8095 8426->8438 8428 9f79c3 8429 9f8095 26 API calls 8428->8429 8430 9f79df 8429->8430 8431 9f8095 26 API calls 8430->8431 8432 9f79fd 8431->8432 8433 9f792d 8432->8433 8434 9f6b10 _free 20 API calls 8432->8434 8435 9f7941 8433->8435 8434->8433 8452 9f7206 RtlLeaveCriticalSection 8435->8452 8437 9f794b 8437->8424 8439 9f80a6 8438->8439 8448 9f80a2 8438->8448 8440 9f80ad 8439->8440 8443 9f80c0 ___scrt_fastfail 8439->8443 8441 9f73d2 __dosmaperr 20 API calls 8440->8441 8442 9f80b2 8441->8442 8444 9f57a1 ___std_exception_copy 26 API calls 8442->8444 8445 9f80ee 8443->8445 8446 9f80f7 8443->8446 8443->8448 8444->8448 8447 9f73d2 __dosmaperr 20 API calls 8445->8447 8446->8448 8450 9f73d2 __dosmaperr 20 API calls 8446->8450 8449 9f80f3 8447->8449 8448->8428 8451 9f57a1 ___std_exception_copy 26 API calls 8449->8451 8450->8449 8451->8448 8452->8437

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 9f1000-9f10a3 call 9f1a90 call 9f4940 SHGetFolderPathW 5 9f14cb-9f14d4 call 9f1960 0->5 6 9f10a9-9f10cd 0->6 10 9f14d9-9f14e2 5->10 8 9f10cf-9f10d1 6->8 9 9f10d3-9f10dc 6->9 11 9f10ef-9f1129 call 9f1a90 call 9f20f0 8->11 12 9f10e0-9f10e9 9->12 13 9f14e4-9f14e5 10->13 14 9f14f1-9f150e call 9f25a8 10->14 24 9f116c-9f1179 11->24 25 9f112b-9f1134 11->25 12->12 15 9f10eb-9f10ed 12->15 17 9f14e6-9f14ec call 9f1c00 13->17 15->11 17->14 28 9f117b-9f1183 call 9f1c00 24->28 29 9f1188-9f11a7 PathFileExistsW 24->29 26 9f1136-9f113e call 9f1c00 25->26 27 9f1143-9f1167 call 9f1b90 25->27 26->27 27->24 28->29 33 9f11a9-9f11c0 call 9f1960 29->33 34 9f1202-9f1254 call 9f20f0 call 9f2200 PathFileExistsW 29->34 40 9f11cf-9f11f5 33->40 41 9f11c2-9f11ca call 9f1c00 33->41 45 9f1288-9f12a1 PathFileExistsW 34->45 46 9f1256-9f1282 MoveFileExW 34->46 40->14 44 9f11fb-9f11fd 40->44 41->40 44->17 47 9f141c-9f1433 call 9f1960 45->47 48 9f12a7-9f12dd LoadLibraryW 45->48 46->45 56 9f1435-9f143d call 9f1c00 47->56 57 9f1442-9f1468 47->57 50 9f12df-9f12e9 GetProcAddress 48->50 51 9f1339-9f134b 48->51 53 9f12eb-9f1305 FreeLibrary 50->53 54 9f1307-9f1337 FreeLibrary 50->54 55 9f1351-9f137b LoadLibraryW 51->55 53->55 54->55 58 9f137d-9f1387 GetProcAddress 55->58 59 9f13b7-9f13bd 55->59 56->57 64 9f146a-9f1472 call 9f1c00 57->64 65 9f1477-9f149d 57->65 60 9f139d-9f13b5 FreeLibrary 58->60 61 9f1389-9f139b FreeLibrary 58->61 62 9f13c3-9f13c9 59->62 60->62 61->62 67 9f13cb 62->67 68 9f1414-9f141a 62->68 64->65 70 9f149f-9f14a7 call 9f1c00 65->70 71 9f14ac-9f14c9 65->71 74 9f13cd-9f13d3 67->74 75 9f13d5 67->75 73 9f13db-9f140f call 9f1960 call 9f1920 * 4 68->73 70->71 71->10 73->14 74->68 74->75 75->73
                                          APIs
                                          • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 009F109B
                                          • PathFileExistsW.KERNELBASE(?,?), ref: 009F11A3
                                          • PathFileExistsW.SHLWAPI(?), ref: 009F1250
                                          • MoveFileExW.KERNEL32(?,?,00000001), ref: 009F1282
                                          • PathFileExistsW.SHLWAPI(?), ref: 009F129D
                                          • LoadLibraryW.KERNEL32(?), ref: 009F12CD
                                          • GetProcAddress.KERNEL32(00000000,ver), ref: 009F12E5
                                          • FreeLibrary.KERNEL32(?), ref: 009F12FF
                                          • FreeLibrary.KERNEL32(?), ref: 009F1331
                                          • LoadLibraryW.KERNEL32(?), ref: 009F1371
                                          • GetProcAddress.KERNEL32(00000000,ver), ref: 009F1383
                                          • FreeLibrary.KERNEL32(?), ref: 009F1395
                                          • FreeLibrary.KERNEL32(?), ref: 009F13AF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: Library$FileFreePath$Exists$AddressLoadProc$FolderMove
                                          • String ID: \Nero\Transfer\Update\$drivespan.dll$new_drivespan.dll$ver
                                          • API String ID: 2307531666-2570186640
                                          • Opcode ID: 44f52940e020ae119b2ad57d1ae8c4b9e88a16c203ab3c3d4b2db30311ed67cb
                                          • Instruction ID: e57ad0cef990b48253b25cb9037c4260241548b95369c9bc64f44c36cdc0663f
                                          • Opcode Fuzzy Hash: 44f52940e020ae119b2ad57d1ae8c4b9e88a16c203ab3c3d4b2db30311ed67cb
                                          • Instruction Fuzzy Hash: 21D1447491522DDADF60DB24CC98BADB7B8FF48300F1401E9E509A2260DB75AF84CFA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 87 9f17a0-9f17ee 89 9f17f4-9f17f9 87->89 90 9f17f0-9f17f2 87->90 92 9f1800-9f1809 89->92 91 9f180f-9f1831 call 9f1a90 call 9f22e0 90->91 98 9f183e-9f1840 91->98 99 9f1833-9f1839 call 9f1c00 91->99 92->92 93 9f180b-9f180d 92->93 93->91 101 9f1847-9f1869 call 9f1000 LoadLibraryW 98->101 102 9f1842 call 9f1510 98->102 99->98 106 9f188e-9f189c GetProcAddress 101->106 107 9f186b-9f187b call 9f22e0 101->107 102->101 109 9f189e-9f18a5 106->109 110 9f18a8-9f18b6 FreeLibrary 106->110 107->110 117 9f187d-9f188c LoadLibraryW 107->117 109->110 111 9f18b8-9f18be call 9f1c00 110->111 112 9f18c3-9f18d5 call 9f25a8 110->112 111->112 117->106 117->110
                                          APIs
                                          • InitCommonControlsEx.COMCTL32 ref: 009F17CE
                                          • LoadLibraryW.KERNELBASE(?,?,?,?,-Restart,?,?), ref: 009F185F
                                          • LoadLibraryW.KERNEL32(drivespan.dll,drivespan.dll,?,?,?,-Restart,?,?), ref: 009F1882
                                          • GetProcAddress.KERNEL32(00000000,run), ref: 009F1894
                                          • FreeLibrary.KERNELBASE(00000000,?,?,?,-Restart,?,?), ref: 009F18A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: Library$Load$AddressCommonControlsFreeInitProc
                                          • String ID: -Restart$drivespan.dll$run$3Ro
                                          • API String ID: 1924428465-3056770509
                                          • Opcode ID: 0dd37657c8fa47f2a79af6039f633b07b27f8bc8c49d8362ed442612e0f38007
                                          • Instruction ID: 97330f04ae4137ca8496f45f511714ff5bb83198d619b56e223b48b3c4ffe1a4
                                          • Opcode Fuzzy Hash: 0dd37657c8fa47f2a79af6039f633b07b27f8bc8c49d8362ed442612e0f38007
                                          • Instruction Fuzzy Hash: E631BE31518209EFC714AB20DC55A7F77E8FF85395F44492CFA8292190EB71DA05CBA2

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 132 9f6268-9f6274 call 9f8597 135 9f6296-9f62a2 call 9f62ed ExitProcess 132->135 136 9f6276-9f6284 GetPEB 132->136 136->135 137 9f6286-9f6290 GetCurrentProcess TerminateProcess 136->137 137->135
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000003,?,009F623E,00000003,00A04638,0000000C,009F6395,00000003,00000002,00000000,?,009F6BDA,00000003), ref: 009F6289
                                          • TerminateProcess.KERNEL32(00000000,?,009F623E,00000003,00A04638,0000000C,009F6395,00000003,00000002,00000000,?,009F6BDA,00000003), ref: 009F6290
                                          • ExitProcess.KERNEL32 ref: 009F62A2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 4bd1ee2d7a0202dbdc39b863e725eecaf4bbe917879664545104c92015434f05
                                          • Instruction ID: a5ef93995aaf43f6f5118876d1d1bfb5733a46048d5f9bfa80a59e640ba4ca70
                                          • Opcode Fuzzy Hash: 4bd1ee2d7a0202dbdc39b863e725eecaf4bbe917879664545104c92015434f05
                                          • Instruction Fuzzy Hash: 44E0B631014248ABDF116F54DE19AB93BA9FF85391F188424FA15CA122CF35ED42EB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 119 9f8255-9f8269 120 9f826b-9f8274 119->120 121 9f8276-9f8291 LoadLibraryExW 119->121 122 9f82cd-9f82cf 120->122 123 9f82ba-9f82c0 121->123 124 9f8293-9f829c GetLastError 121->124 127 9f82c9 123->127 128 9f82c2-9f82c3 FreeLibrary 123->128 125 9f829e-9f82a9 LoadLibraryExW 124->125 126 9f82ab 124->126 129 9f82ad-9f82af 125->129 126->129 130 9f82cb-9f82cc 127->130 128->127 129->123 131 9f82b1-9f82b8 129->131 130->122 131->130
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,009F81FC,?,00000000,00000000,00000000,?,009F83F9,00000006,FlsSetValue), ref: 009F8287
                                          • GetLastError.KERNEL32(?,009F81FC,?,00000000,00000000,00000000,?,009F83F9,00000006,FlsSetValue,00A00278,00A00280,00000000,00000364,?,009F7100), ref: 009F8293
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,009F81FC,?,00000000,00000000,00000000,?,009F83F9,00000006,FlsSetValue,00A00278,00A00280,00000000), ref: 009F82A1
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID:
                                          • API String ID: 3177248105-0
                                          • Opcode ID: 405809ce476bed6555f2bb00dd81004c8fda8e0da5a780b76b7b6b805d45013f
                                          • Instruction ID: 953844dd094442e3475f4703b9a9c7287d439a1b3db996da3273d2a46c36c303
                                          • Opcode Fuzzy Hash: 405809ce476bed6555f2bb00dd81004c8fda8e0da5a780b76b7b6b805d45013f
                                          • Instruction Fuzzy Hash: 5201FC3261562AABC7614B68DC58EBB379CEF057F17240630FA26D3140DF20E800C7E0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 140 9f81b9-9f81e3 141 9f824e 140->141 142 9f81e5-9f81e7 140->142 145 9f8250-9f8254 141->145 143 9f81ed-9f81f3 142->143 144 9f81e9-9f81eb 142->144 146 9f820f 143->146 147 9f81f5-9f81f7 call 9f8255 143->147 144->145 148 9f8211-9f8213 146->148 152 9f81fc-9f81ff 147->152 150 9f823e-9f824c 148->150 151 9f8215-9f8223 GetProcAddress 148->151 150->141 153 9f8238 151->153 154 9f8225-9f822e call 9f2a2d 151->154 155 9f8201-9f8207 152->155 156 9f8230-9f8236 152->156 153->150 154->144 155->147 157 9f8209 155->157 156->148 157->146
                                          APIs
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 009F8219
                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 009F8226
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: AddressProc__crt_fast_encode_pointer
                                          • String ID:
                                          • API String ID: 2279764990-0
                                          • Opcode ID: afb16d1ab05f8a5baabd0cbb994813821db44acecc3f4dae38f6a42c41850e1d
                                          • Instruction ID: 88a7d31e5514a3493da06994098ba735d27bb3048321abf957d4804aec0f7a81
                                          • Opcode Fuzzy Hash: afb16d1ab05f8a5baabd0cbb994813821db44acecc3f4dae38f6a42c41850e1d
                                          • Instruction Fuzzy Hash: 9511A337A5092D9BDB21DF58EC509BB7399AB807A47164620EF35AB244DE30FC0287D0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 334 9f1510-9f1576 GetModuleFileNameW 335 9f157c-9f1582 334->335 336 9f1578-9f157a 334->336 338 9f1585-9f158e 335->338 337 9f1594-9f15f5 call 9f1a90 call 9f19f0 call 9f18e0 336->337 346 9f1638-9f1641 337->346 347 9f15f7-9f1600 337->347 338->338 339 9f1590-9f1592 338->339 339->337 350 9f1643-9f164b call 9f1c00 346->350 351 9f1650-9f166a GetCurrentProcessId 346->351 348 9f160f-9f1633 call 9f1b90 347->348 349 9f1602-9f160a call 9f1c00 347->349 348->346 349->348 350->351 355 9f1670-9f1673 351->355 356 9f1679-9f16a7 CreateToolhelp32Snapshot Process32FirstW 355->356 357 9f1754-9f1768 Sleep 355->357 360 9f16ad-9f16ba Process32NextW 356->360 361 9f173a-9f174e CloseHandle 356->361 358 9f176a-9f1772 call 9f1c00 357->358 359 9f1777-9f1792 call 9f25a8 357->359 358->359 360->361 364 9f16c0-9f16da 360->364 361->355 361->357 365 9f16e0-9f16e6 364->365 367 9f16e8-9f16eb 365->367 368 9f1706-9f1708 365->368 369 9f16ed-9f16f5 367->369 370 9f1702-9f1704 367->370 371 9f170b-9f170d 368->371 369->368 372 9f16f7-9f1700 369->372 370->371 373 9f170f-9f1715 371->373 374 9f1717-9f1724 Process32NextW 371->374 372->365 372->370 373->374 375 9f1728-9f1734 Sleep 373->375 374->364 376 9f1726 374->376 375->361 376->361
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000100,2FAA7487), ref: 009F154C
                                          • GetCurrentProcessId.KERNEL32(?,00000001,-00000001,?), ref: 009F1650
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 009F168E
                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 009F169E
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 009F16B5
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 009F171F
                                          • Sleep.KERNEL32(00000064), ref: 009F1734
                                          • CloseHandle.KERNEL32(00000000), ref: 009F173B
                                          • Sleep.KERNEL32(000000C8), ref: 009F1759
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: Process32$NextSleep$CloseCreateCurrentFileFirstHandleModuleNameProcessSnapshotToolhelp32
                                          • String ID: \
                                          • API String ID: 8921262-2967466578
                                          • Opcode ID: deb78f4625025ad6a08c6e047cd7ddf0dfadef8e9ebb4a8064169a8cd04a33d8
                                          • Instruction ID: fc43051eb1e8c547e31e50ac962704b3d396cc26626f54103adea77ba8026c2b
                                          • Opcode Fuzzy Hash: deb78f4625025ad6a08c6e047cd7ddf0dfadef8e9ebb4a8064169a8cd04a33d8
                                          • Instruction Fuzzy Hash: FD616B7190111DDADB20AB60CD89BFAB7B8FF15344F0001E9E60AE6151EB359E85CFA4
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,009F330B), ref: 009F56CF
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,009F330B), ref: 009F56D9
                                          • UnhandledExceptionFilter.KERNEL32(00000016,?,?,?,?,?,009F330B), ref: 009F56E6
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: d97a3c7f3aa482c22671a88dcbe9f6c33724989e773cc82a5a06d680121356cc
                                          • Instruction ID: 302776046ddf7572933efe8a675fa6fb280405cab9aa601c15177f6ca3b6bffc
                                          • Opcode Fuzzy Hash: d97a3c7f3aa482c22671a88dcbe9f6c33724989e773cc82a5a06d680121356cc
                                          • Instruction Fuzzy Hash: 8231B37491122C9BCB21DF64D889B9DBBB8AF48710F5041EAE90CA7251EB709B85CF44
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,009FCD10,?,?,00000008,?,?,009FC9B0,00000000), ref: 009FCF42
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: da79d4e61c8911e3196d7f336fba96753fa86fe2a8992d91ba5053868113748b
                                          • Instruction ID: 072b02549745b47a41f10210e48fc117b9afaf9dabed851579cc1abcff6d65fc
                                          • Opcode Fuzzy Hash: da79d4e61c8911e3196d7f336fba96753fa86fe2a8992d91ba5053868113748b
                                          • Instruction Fuzzy Hash: 10B1297121060D9FD719CF28C58AB64BBE1FF45364F25C658EAAACF2A1C335E991CB40
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00002F23,009F26A2), ref: 009F2F1C
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: b1dc67b1b4dc3cbfc78417e3ce575f67b66cc0326a90dc91b10d600c92d75ba1
                                          • Instruction ID: ca589d07cbfd8171f31f154e2c34059e9d3bd2e8f27f2d079499f1f3ef808bd1
                                          • Opcode Fuzzy Hash: b1dc67b1b4dc3cbfc78417e3ce575f67b66cc0326a90dc91b10d600c92d75ba1
                                          • Instruction Fuzzy Hash:
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: HeapProcess
                                          • String ID:
                                          • API String ID: 54951025-0
                                          • Opcode ID: 6f2f4169c8716fd68e9b396ed29009b3bda769cf0468c243597042c30ab6e6e5
                                          • Instruction ID: f890f3258666559de3a6829179a34af754d34431f79f4a095ed5bbb30729102c
                                          • Opcode Fuzzy Hash: 6f2f4169c8716fd68e9b396ed29009b3bda769cf0468c243597042c30ab6e6e5
                                          • Instruction Fuzzy Hash: BCA01130A0C280CBA3008F30AA8822C3BA8AA00BA03080028A800C8020EA308082BA02

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 277 9f8f76-9f8f8a 278 9f8f8c-9f8f91 277->278 279 9f8ff8-9f9000 277->279 278->279 280 9f8f93-9f8f98 278->280 281 9f9047-9f905f call 9f90e9 279->281 282 9f9002-9f9005 279->282 280->279 283 9f8f9a-9f8f9d 280->283 292 9f9062-9f9069 281->292 282->281 285 9f9007-9f9044 call 9f6b10 * 4 282->285 283->279 286 9f8f9f-9f8fa7 283->286 285->281 290 9f8fa9-9f8fac 286->290 291 9f8fc1-9f8fc9 286->291 290->291 296 9f8fae-9f8fc0 call 9f6b10 call 9f8af0 290->296 294 9f8fcb-9f8fce 291->294 295 9f8fe3-9f8ff7 call 9f6b10 * 2 291->295 297 9f906b-9f906f 292->297 298 9f9088-9f908c 292->298 294->295 300 9f8fd0-9f8fe2 call 9f6b10 call 9f8bee 294->300 295->279 296->291 305 9f9085 297->305 306 9f9071-9f9074 297->306 301 9f908e-9f9093 298->301 302 9f90a4-9f90b0 298->302 300->295 309 9f9095-9f9098 301->309 310 9f90a1 301->310 302->292 312 9f90b2-9f90bf call 9f6b10 302->312 305->298 306->305 314 9f9076-9f9084 call 9f6b10 * 2 306->314 309->310 317 9f909a-9f90a0 call 9f6b10 309->317 310->302 314->305 317->310
                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 009F8FBA
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B0D
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B1F
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B31
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B43
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B55
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B67
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B79
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B8B
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8B9D
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8BAF
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8BC1
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8BD3
                                            • Part of subcall function 009F8AF0: _free.LIBCMT ref: 009F8BE5
                                          • _free.LIBCMT ref: 009F8FAF
                                            • Part of subcall function 009F6B10: HeapFree.KERNEL32(00000000,00000000,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?), ref: 009F6B26
                                            • Part of subcall function 009F6B10: GetLastError.KERNEL32(?,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?,?), ref: 009F6B38
                                          • _free.LIBCMT ref: 009F8FD1
                                          • _free.LIBCMT ref: 009F8FE6
                                          • _free.LIBCMT ref: 009F8FF1
                                          • _free.LIBCMT ref: 009F9013
                                          • _free.LIBCMT ref: 009F9026
                                          • _free.LIBCMT ref: 009F9034
                                          • _free.LIBCMT ref: 009F903F
                                          • _free.LIBCMT ref: 009F9077
                                          • _free.LIBCMT ref: 009F907E
                                          • _free.LIBCMT ref: 009F909B
                                          • _free.LIBCMT ref: 009F90B3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: 2f91904a9bd915cd3163bd68f95f437de8ddde0125dee3d08c64f1ec5e754f56
                                          • Instruction ID: fa7ff6405480168aade0ddeb0f65e9f85d7d1648b2b51b738acf98c49c4e9912
                                          • Opcode Fuzzy Hash: 2f91904a9bd915cd3163bd68f95f437de8ddde0125dee3d08c64f1ec5e754f56
                                          • Instruction Fuzzy Hash: 2A313931604309AFEB70AA38D845B7A73EDEF80351F144929F659D7191DF32EDA08B54

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 377 9f6f39-9f6f4a 378 9f6f4c-9f6f55 call 9f6b10 377->378 379 9f6f56-9f6fe1 call 9f6b10 * 9 call 9f6dff call 9f6e4f 377->379 378->379
                                          APIs
                                          • _free.LIBCMT ref: 009F6F4D
                                            • Part of subcall function 009F6B10: HeapFree.KERNEL32(00000000,00000000,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?), ref: 009F6B26
                                            • Part of subcall function 009F6B10: GetLastError.KERNEL32(?,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?,?), ref: 009F6B38
                                          • _free.LIBCMT ref: 009F6F59
                                          • _free.LIBCMT ref: 009F6F64
                                          • _free.LIBCMT ref: 009F6F6F
                                          • _free.LIBCMT ref: 009F6F7A
                                          • _free.LIBCMT ref: 009F6F85
                                          • _free.LIBCMT ref: 009F6F90
                                          • _free.LIBCMT ref: 009F6F9B
                                          • _free.LIBCMT ref: 009F6FA6
                                          • _free.LIBCMT ref: 009F6FB4
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 8d1209b246d896589b8e65678d904a31742781ebad39db0be88aac7ebf73013e
                                          • Instruction ID: 347b7536ff5718fbc9c21f4d921f55e3b3ca76b0b0f93fbdadc133fe2f0ba922
                                          • Opcode Fuzzy Hash: 8d1209b246d896589b8e65678d904a31742781ebad39db0be88aac7ebf73013e
                                          • Instruction Fuzzy Hash: 4E11587661420CBFCB01EF54C952EEE3BA9EF44391B5145A5FB088F632DA31DE509B90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 404 9fa33f-9fa358 405 9fa36e-9fa373 404->405 406 9fa35a-9fa36a call 9fab48 404->406 408 9fa375-9fa37d 405->408 409 9fa380-9fa3a4 MultiByteToWideChar 405->409 406->405 414 9fa36c 406->414 408->409 411 9fa3aa-9fa3b6 409->411 412 9fa537-9fa54a call 9f25a8 409->412 415 9fa40a 411->415 416 9fa3b8-9fa3c9 411->416 414->405 420 9fa40c-9fa40e 415->420 417 9fa3cb-9fa3da call 9fd5b0 416->417 418 9fa3e8-9fa3f9 call 9f6b4a 416->418 423 9fa52c 417->423 429 9fa3e0-9fa3e6 417->429 418->423 430 9fa3ff 418->430 420->423 424 9fa414-9fa427 MultiByteToWideChar 420->424 428 9fa52e-9fa535 call 9f8ed9 423->428 424->423 427 9fa42d-9fa448 call 9f848d 424->427 427->423 436 9fa44e-9fa455 427->436 428->412 433 9fa405-9fa408 429->433 430->433 433->420 437 9fa48f-9fa49b 436->437 438 9fa457-9fa45c 436->438 440 9fa49d-9fa4ae 437->440 441 9fa4e7 437->441 438->428 439 9fa462-9fa464 438->439 439->423 442 9fa46a-9fa484 call 9f848d 439->442 444 9fa4c9-9fa4da call 9f6b4a 440->444 445 9fa4b0-9fa4bf call 9fd5b0 440->445 443 9fa4e9-9fa4eb 441->443 442->428 456 9fa48a 442->456 447 9fa4ed-9fa506 call 9f848d 443->447 448 9fa525-9fa52b call 9f8ed9 443->448 444->448 460 9fa4dc 444->460 445->448 459 9fa4c1-9fa4c7 445->459 447->448 462 9fa508-9fa50f 447->462 448->423 456->423 461 9fa4e2-9fa4e5 459->461 460->461 461->443 463 9fa54b-9fa551 462->463 464 9fa511-9fa512 462->464 465 9fa513-9fa523 WideCharToMultiByte 463->465 464->465 465->448 466 9fa553-9fa55a call 9f8ed9 465->466 466->428
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,?,00000000,?,?,?,009FA590,?,?,00000000), ref: 009FA399
                                          • __alloca_probe_16.LIBCMT ref: 009FA3D1
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,009FA590,?,?,00000000,?,?,?), ref: 009FA41F
                                          • __alloca_probe_16.LIBCMT ref: 009FA4B6
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 009FA519
                                          • __freea.LIBCMT ref: 009FA526
                                            • Part of subcall function 009F6B4A: RtlAllocateHeap.NTDLL(00000000,009F330B,?), ref: 009F6B7C
                                          • __freea.LIBCMT ref: 009FA52F
                                          • __freea.LIBCMT ref: 009FA554
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                          • String ID:
                                          • API String ID: 3864826663-0
                                          • Opcode ID: b5919ce39b2eee18471e5c69cbb40f10264058497e078be3e28cdb304f9e14d0
                                          • Instruction ID: f643a0653a45187f37aa4f1441518ceb08c095b46c6a4825bc5ac862c798b960
                                          • Opcode Fuzzy Hash: b5919ce39b2eee18471e5c69cbb40f10264058497e078be3e28cdb304f9e14d0
                                          • Instruction Fuzzy Hash: BA51EEB261021AAFDB248F64DC85FBF77AEEB80750B244628FE08D6150EB74DC40D792

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 469 9fac93-9facf0 GetConsoleCP 470 9facf6-9fad12 469->470 471 9fae33-9fae45 call 9f25a8 469->471 472 9fad2d-9fad3e call 9f8aca 470->472 473 9fad14-9fad2b 470->473 480 9fad64-9fad66 472->480 481 9fad40-9fad43 472->481 475 9fad67-9fad76 call 9f9c7c 473->475 475->471 483 9fad7c-9fad9c WideCharToMultiByte 475->483 480->475 484 9fae0a-9fae29 481->484 485 9fad49-9fad5b call 9f9c7c 481->485 483->471 486 9fada2-9fadb8 WriteFile 483->486 484->471 485->471 492 9fad61-9fad62 485->492 488 9fae2b-9fae31 GetLastError 486->488 489 9fadba-9fadcb 486->489 488->471 489->471 491 9fadcd-9fadd1 489->491 493 9fadff-9fae02 491->493 494 9fadd3-9fadf1 WriteFile 491->494 492->483 493->470 496 9fae08 493->496 494->488 495 9fadf3-9fadf7 494->495 495->471 497 9fadf9-9fadfc 495->497 496->471 497->493
                                          APIs
                                          • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,009FB408,?,00000000,?,00000000,00000000), ref: 009FACD5
                                          • __fassign.LIBCMT ref: 009FAD50
                                          • __fassign.LIBCMT ref: 009FAD6B
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 009FAD91
                                          • WriteFile.KERNEL32(?,?,00000000,009FB408,00000000,?,?,?,?,?,?,?,?,?,009FB408,?), ref: 009FADB0
                                          • WriteFile.KERNEL32(?,?,00000001,009FB408,00000000,?,?,?,?,?,?,?,?,?,009FB408,?), ref: 009FADE9
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID:
                                          • API String ID: 1324828854-0
                                          • Opcode ID: 472919e2deb6324db9cb700402a0726c32c26dc270cffe8f108696de92e7e956
                                          • Instruction ID: 750334f34439c9ce57e77098c2ac6094e4c21b14b9be622e496da112380724b6
                                          • Opcode Fuzzy Hash: 472919e2deb6324db9cb700402a0726c32c26dc270cffe8f108696de92e7e956
                                          • Instruction Fuzzy Hash: E351A1B1E0024D9FDB10CFA8D885AFEBBF8EF19300F14411AEA59E7291D730A941CB61

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 498 9f8c93-9f8c9e 499 9f8d74-9f8d76 498->499 500 9f8ca4-9f8d71 call 9f8c57 * 5 call 9f6b10 * 3 call 9f8c57 * 5 call 9f6b10 * 4 498->500 500->499
                                          APIs
                                            • Part of subcall function 009F8C57: _free.LIBCMT ref: 009F8C80
                                          • _free.LIBCMT ref: 009F8CE1
                                            • Part of subcall function 009F6B10: HeapFree.KERNEL32(00000000,00000000,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?), ref: 009F6B26
                                            • Part of subcall function 009F6B10: GetLastError.KERNEL32(?,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?,?), ref: 009F6B38
                                          • _free.LIBCMT ref: 009F8CEC
                                          • _free.LIBCMT ref: 009F8CF7
                                          • _free.LIBCMT ref: 009F8D4B
                                          • _free.LIBCMT ref: 009F8D56
                                          • _free.LIBCMT ref: 009F8D61
                                          • _free.LIBCMT ref: 009F8D6C
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 0bb379ea52c51a684ff9bb70345eabbbe80e5a958499be13c44c1439a6277fea
                                          • Instruction ID: 37da83b68eca802a5827932d929a5e79b808449f486502d6dcfcc0cddbf5ce61
                                          • Opcode Fuzzy Hash: 0bb379ea52c51a684ff9bb70345eabbbe80e5a958499be13c44c1439a6277fea
                                          • Instruction Fuzzy Hash: A2112B71A45B0CBADA60BBB1CC07FEB779CAF84701F404C19B3D9AA092DE75B5548760
                                          APIs
                                          • GetLastError.KERNEL32(?,?,009F4AD7,009F3E74,00A044D8,00000010,009F363C,?,?,?,?,?,00000000,?), ref: 009F4AEE
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 009F4AFC
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 009F4B15
                                          • SetLastError.KERNEL32(00000000,009F4AD7,009F3E74,00A044D8,00000010,009F363C,?,?,?,?,?,00000000,?), ref: 009F4B67
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 29df88f28be007eef3f065c0494bba323b7be6e33dbecefc00c51a06e2561d16
                                          • Instruction ID: ed14afba50c44ebe8bf81e9734c38cbd453fdea46a964c44e0e82e1335583668
                                          • Opcode Fuzzy Hash: 29df88f28be007eef3f065c0494bba323b7be6e33dbecefc00c51a06e2561d16
                                          • Instruction Fuzzy Hash: 2601B53364971E5DE7245BB47C85B7B6A9CDF553BB3210229F320851E2EE918C129344
                                          APIs
                                          • GetLastError.KERNEL32(?,?,009F6A8B,00A046C0,0000000C,009F2F63), ref: 009F7032
                                          • _free.LIBCMT ref: 009F7065
                                          • _free.LIBCMT ref: 009F708D
                                          • SetLastError.KERNEL32(00000000), ref: 009F709A
                                          • SetLastError.KERNEL32(00000000), ref: 009F70A6
                                          • _abort.LIBCMT ref: 009F70AC
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID:
                                          • API String ID: 3160817290-0
                                          • Opcode ID: 62a1265f359afed9a614e50a5f845577c2d8325e2d0cb956236a5278c19d488b
                                          • Instruction ID: d09214a49599ff23609bbd1eed3d805f7f980cb936bab8a6489ad3bafc0ac2be
                                          • Opcode Fuzzy Hash: 62a1265f359afed9a614e50a5f845577c2d8325e2d0cb956236a5278c19d488b
                                          • Instruction Fuzzy Hash: 45F0AF3624C70C66D62233B4AC1AB3F66699FC2762B280524FB14D62E2EE6498129324
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,009F629E,00000003,?,009F623E,00000003,00A04638,0000000C,009F6395,00000003,00000002), ref: 009F630D
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 009F6320
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,009F629E,00000003,?,009F623E,00000003,00A04638,0000000C,009F6395,00000003,00000002,00000000), ref: 009F6343
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: e0c9174c8214d7d43f0a92b13f7c1f427a24b871d4d4f610db7ff800217d6673
                                          • Instruction ID: 06833dd24a5defa01cfc5dc4f555af2aeecf10da6efce46cecb23509752f6f82
                                          • Opcode Fuzzy Hash: e0c9174c8214d7d43f0a92b13f7c1f427a24b871d4d4f610db7ff800217d6673
                                          • Instruction Fuzzy Hash: 36F04F71A1420CFBCB119F90DC6ABBDBFB8EF44716F044168FA05E22A1DB708951DB90
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 0aeeef7565581c08289078f5294c47c283404c382f1dbc83c6e220398d35a8a3
                                          • Instruction ID: e5b9e8385656e69af49f532fe6b4ad1d48a5e49f3c26af940901b3386d379afa
                                          • Opcode Fuzzy Hash: 0aeeef7565581c08289078f5294c47c283404c382f1dbc83c6e220398d35a8a3
                                          • Instruction Fuzzy Hash: 57419472A003189FDB24DF78C981A6DB7E5EF89718F154569E715EB281DB31AD01CB80
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000100,?,00000000,?,?,00000000), ref: 009F8E09
                                          • __alloca_probe_16.LIBCMT ref: 009F8E41
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 009F8E92
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 009F8EA4
                                          • __freea.LIBCMT ref: 009F8EAD
                                            • Part of subcall function 009F6B4A: RtlAllocateHeap.NTDLL(00000000,009F330B,?), ref: 009F6B7C
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                          • String ID:
                                          • API String ID: 313313983-0
                                          • Opcode ID: 6609e1710d37b2d06ffbe336f3955b7ad5747973632b53c83e5a9be050bc3e77
                                          • Instruction ID: c661e2c8204a6f476a93730a39b46949a7aaf56081b6ee3aa09ee1d3e22dd259
                                          • Opcode Fuzzy Hash: 6609e1710d37b2d06ffbe336f3955b7ad5747973632b53c83e5a9be050bc3e77
                                          • Instruction Fuzzy Hash: 4931AB72A1020EABDF24AF64DC85EBF7BA9EF40710B144128FE15DA291EB35DD54CB90
                                          APIs
                                          • GetLastError.KERNEL32(009F330B,009F330B,?,009F73D7,009F6B8D,?,?,009F47F0,?,?,00000000,?,?,009F322E,009F330B,?), ref: 009F70B7
                                          • _free.LIBCMT ref: 009F70EC
                                          • _free.LIBCMT ref: 009F7113
                                          • SetLastError.KERNEL32(00000000,?,009F330B), ref: 009F7120
                                          • SetLastError.KERNEL32(00000000,?,009F330B), ref: 009F7129
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID:
                                          • API String ID: 3170660625-0
                                          • Opcode ID: afce24251592e463adb13ed917be1abb181f5945e1ffe2df5bc5ce7408eb92a4
                                          • Instruction ID: 509144de709d2531204a4527ce77329d6fcb99fe91e228ba09f207a18e945908
                                          • Opcode Fuzzy Hash: afce24251592e463adb13ed917be1abb181f5945e1ffe2df5bc5ce7408eb92a4
                                          • Instruction Fuzzy Hash: 7901FF3634D70C77D32267B46C86B3F666DEFC97667280424FB15D2292EE6888269320
                                          APIs
                                          • _free.LIBCMT ref: 009F8C06
                                            • Part of subcall function 009F6B10: HeapFree.KERNEL32(00000000,00000000,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?), ref: 009F6B26
                                            • Part of subcall function 009F6B10: GetLastError.KERNEL32(?,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?,?), ref: 009F6B38
                                          • _free.LIBCMT ref: 009F8C18
                                          • _free.LIBCMT ref: 009F8C2A
                                          • _free.LIBCMT ref: 009F8C3C
                                          • _free.LIBCMT ref: 009F8C4E
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 1b1afe586e9167c469f197ea8535835df9f37a4ddedd321823955a5dc9335a06
                                          • Instruction ID: 5d8a733c7d4aa78cadf4ab07b4e246e6541b9a7fc61ca063eb87ebc98fef145d
                                          • Opcode Fuzzy Hash: 1b1afe586e9167c469f197ea8535835df9f37a4ddedd321823955a5dc9335a06
                                          • Instruction Fuzzy Hash: 12F0127250A20C7BC768EBA4E5C6D7773EDAA40715B640C09F244D7501CF31FC928764
                                          APIs
                                          • _free.LIBCMT ref: 009F699E
                                            • Part of subcall function 009F6B10: HeapFree.KERNEL32(00000000,00000000,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?), ref: 009F6B26
                                            • Part of subcall function 009F6B10: GetLastError.KERNEL32(?,?,009F8C85,?,00000000,?,00000000,?,009F8CAC,?,00000007,?,?,009F910E,?,?), ref: 009F6B38
                                          • _free.LIBCMT ref: 009F69B0
                                          • _free.LIBCMT ref: 009F69C3
                                          • _free.LIBCMT ref: 009F69D4
                                          • _free.LIBCMT ref: 009F69E5
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 52c8d33e45fe117d03ad3f7abab358d6e5fd031b3f0bd8e9c18c2f3730bcfbd4
                                          • Instruction ID: 6b20eabefbe3b5ceb6c8c589a19e87df2fce4c85283082b631be11e10fd80e8a
                                          • Opcode Fuzzy Hash: 52c8d33e45fe117d03ad3f7abab358d6e5fd031b3f0bd8e9c18c2f3730bcfbd4
                                          • Instruction Fuzzy Hash: 8BF03074D0831CABDA11EFA4BC5195D37B4F7447253004606F914D62B5CB3178639F96
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe,00000104), ref: 009F5B3A
                                          • _free.LIBCMT ref: 009F5C05
                                          • _free.LIBCMT ref: 009F5C0F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: _free$FileModuleName
                                          • String ID: C:\Users\user\AppData\Roaming\@Klabin\Microsoft Corporativa\Flexpcis.exe
                                          • API String ID: 2506810119-3704016030
                                          • Opcode ID: ac2ed4efaf0539fb359cdeb89a7ecd3e72710eebf4156788890bd3e88321b0bc
                                          • Instruction ID: 57539270c5564143f333d2445d092d0226c71196ae5ee541f9cd057bd367a86f
                                          • Opcode Fuzzy Hash: ac2ed4efaf0539fb359cdeb89a7ecd3e72710eebf4156788890bd3e88321b0bc
                                          • Instruction Fuzzy Hash: 45317A71E0475CEFDB21DF999885DAEBBBCEB85311B1140A6EB0497211D6B09E41CBA0
                                          APIs
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 009F1EC4
                                            • Part of subcall function 009F32DD: __CxxThrowException@8.LIBVCRUNTIME ref: 009F32F4
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 009F1ED9
                                          • new.LIBCMT ref: 009F1EDF
                                          • new.LIBCMT ref: 009F1EF3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task$Exception@8Throw
                                          • String ID:
                                          • API String ID: 3339364867-0
                                          • Opcode ID: 166f44b9b2f9fb4f0d3fc0ede0629c709bb95d123eca62436eb2dea707dd1053
                                          • Instruction ID: 095b509843c682cbb2977fb041f40b7b2e102b63831f41aa89219b225373a50d
                                          • Opcode Fuzzy Hash: 166f44b9b2f9fb4f0d3fc0ede0629c709bb95d123eca62436eb2dea707dd1053
                                          • Instruction Fuzzy Hash: 9941B371A10609DBD724DF24D98167AB7F9EB44760F200B2DFA66C7290E734E904CBE1
                                          APIs
                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 009F360E
                                            • Part of subcall function 009F3C46: ___AdjustPointer.LIBCMT ref: 009F3C90
                                          • _UnwindNestedFrames.LIBCMT ref: 009F3625
                                          • ___FrameUnwindToState.LIBVCRUNTIME ref: 009F3637
                                          • CallCatchBlock.LIBVCRUNTIME ref: 009F365B
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                          • String ID:
                                          • API String ID: 2633735394-0
                                          • Opcode ID: c818ee3c194d0a60d1f22e1fc4dc6d3ef6eda792af7de8886e093e75c8865d1b
                                          • Instruction ID: c47511a74097aa8c5cae83fc5c0d4c3a947c7a1d6a8fc0c819954811617e2ee5
                                          • Opcode Fuzzy Hash: c818ee3c194d0a60d1f22e1fc4dc6d3ef6eda792af7de8886e093e75c8865d1b
                                          • Instruction Fuzzy Hash: 1501E93200010DBBCF125F55CC02EEA7BBAFF88754F158114FE5865121D73AE961DBA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4b4d3f94c81d3943c378cad470bf1a73962749ad578d4a4a79ac19c895b724af
                                          • Instruction ID: 0507a94dd56e0b9eb5dded574325afd6c5fdc3bdfc23ce9add0d1fd6ca9379f5
                                          • Opcode Fuzzy Hash: 4b4d3f94c81d3943c378cad470bf1a73962749ad578d4a4a79ac19c895b724af
                                          • Instruction Fuzzy Hash: 8BF0A7B370420C0AD718E7749C66B7E72988B643607144639F32AC6281FD21D994C759
                                          APIs
                                          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 009F48B6
                                          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 009F48BB
                                          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 009F48C0
                                            • Part of subcall function 009F514E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 009F515F
                                          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 009F48D5
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.2045203763.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                          • Associated: 00000003.00000002.2045175617.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045227113.00000000009FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045249364.0000000000A06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.2045268987.0000000000A08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_9f0000_Flexpcis.jbxd
                                          Similarity
                                          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                          • String ID:
                                          • API String ID: 1761009282-0
                                          • Opcode ID: e092bf8d1f2de1a436e08f72e43c775e9d4ad525a9e452ad70d54133d921d8c2
                                          • Instruction ID: 824bea240295fcd0a8d843af64d6df62f685461a5793dfe19e4666a9e4e9c166
                                          • Opcode Fuzzy Hash: e092bf8d1f2de1a436e08f72e43c775e9d4ad525a9e452ad70d54133d921d8c2
                                          • Instruction Fuzzy Hash: F6C04C14155A8D551C247AF165123BF03041CD37C6BA226C1EBA11781399095C5B1B77