Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.dll

Overview

General Information

Sample name:file.dll
(renamed file extension from exe to dll)
Original sample name:file.exe
Analysis ID:1521607
MD5:2fe5ff05cdaef7b6539ed20a44aabdeb
SHA1:d575cf3063ac1f573a5a36587db26a7fb2418946
SHA256:637c98d2e6251df15fc64ba436009706269bfa9d7b1316e43a79575f7891f622
Tags:dllexex64user-jstrosch
Infos:

Detection

Score:7
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7496 cmdline: loaddll64.exe "C:\Users\user\Desktop\file.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7548 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7572 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • WerFault.exe (PID: 7692 cmdline: C:\Windows\system32\WerFault.exe -u -p 7572 -s 404 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7556 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7676 cmdline: C:\Windows\system32\WerFault.exe -u -p 7556 -s 396 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7844 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@Z MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7932 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@Z MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7956 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7964 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@Z MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7980 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@Z MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7996 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Update MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8008 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UnlockDSP MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8020 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UnloadPlugin MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8028 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetUserData MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8040 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetStreamBufferSize MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8060 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSpeakerPosition MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8088 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSoftwareFormat MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8104 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSoftwareChannels MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8128 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetReverbProperties MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8136 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetPluginPath MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8156 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetOutputByPlugin MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8164 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetOutput MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8172 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetNetworkTimeout MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7192 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetNetworkProxy MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7184 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetGeometrySettings MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7268 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetFileSystem MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7256 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetDriver MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7244 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetDSPBufferSize MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7296 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetCallback MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6044 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetAdvancedSettings MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2256 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DSettings MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2260 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DRolloffCallback MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 736 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DNumListeners MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4144 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DListenerAttributes MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3604 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Release MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4600 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_RegisterOutput MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\platforms\win\vs2012\_builds\lowlevel_api\Release Dynamic\x64\fmod64.pdb source: loaddll64.exe, 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1903303766.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1891244645.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.1902135714.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7CC600 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExW,_errno,_errno,_wfullpath,_errno,_errno,_errno,_wfullpath,IsRootUNCName,GetDriveTypeW,free,__loctotime64_t,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,__loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,__loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,__loctotime64_t,FindClose,__wdtoxmode,_errno,GetLastError,_dosmaperr,FindClose,0_2_00007FFDFB7CC600
Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CDB9B0_2_00007FFDFB6CDB9B
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7C8C240_2_00007FFDFB7C8C24
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB701B800_2_00007FFDFB701B80
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6F6B800_2_00007FFDFB6F6B80
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6BFC400_2_00007FFDFB6BFC40
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7C4B700_2_00007FFDFB7C4B70
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7DAB940_2_00007FFDFB7DAB94
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6D1C000_2_00007FFDFB6D1C00
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7A9BB00_2_00007FFDFB7A9BB0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6FCBF00_2_00007FFDFB6FCBF0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CCBF00_2_00007FFDFB6CCBF0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7AAAF00_2_00007FFDFB7AAAF0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7CAB480_2_00007FFDFB7CAB48
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7C4B400_2_00007FFDFB7C4B40
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB70CA800_2_00007FFDFB70CA80
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D1AA40_2_00007FFDFB7D1AA4
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7C7AB00_2_00007FFDFB7C7AB0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB704AE00_2_00007FFDFB704AE0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CB9A00_2_00007FFDFB6CB9A0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CE9830_2_00007FFDFB6CE983
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7629600_2_00007FFDFB762960
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6B8A500_2_00007FFDFB6B8A50
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CF9D00_2_00007FFDFB6CF9D0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6E38C00_2_00007FFDFB6E38C0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6E48800_2_00007FFDFB6E4880
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB73C9400_2_00007FFDFB73C940
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CE9440_2_00007FFDFB6CE944
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6D89300_2_00007FFDFB6D8930
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D68880_2_00007FFDFB7D6888
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CDFD60_2_00007FFDFB6CDFD6
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB782F700_2_00007FFDFB782F70
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB761FA00_2_00007FFDFB761FA0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CDEBF0_2_00007FFDFB6CDEBF
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6E4EB00_2_00007FFDFB6E4EB0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6FCEB00_2_00007FFDFB6FCEB0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6E9EA00_2_00007FFDFB6E9EA0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D6F440_2_00007FFDFB7D6F44
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6F5E700_2_00007FFDFB6F5E70
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6F0F100_2_00007FFDFB6F0F10
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6E0F000_2_00007FFDFB6E0F00
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6C1EF00_2_00007FFDFB6C1EF0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6C2D800_2_00007FFDFB6C2D80
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CDD7F0_2_00007FFDFB6CDD7F
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7DDD6C0_2_00007FFDFB7DDD6C
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CDE0A0_2_00007FFDFB6CDE0A
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6B2E000_2_00007FFDFB6B2E00
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CDCB10_2_00007FFDFB6CDCB1
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6EACA00_2_00007FFDFB6EACA0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB700D500_2_00007FFDFB700D50
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB77CCD00_2_00007FFDFB77CCD0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6D13D00_2_00007FFDFB6D13D0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7434200_2_00007FFDFB743420
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CE37D0_2_00007FFDFB6CE37D
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7053600_2_00007FFDFB705360
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6D94300_2_00007FFDFB6D9430
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6FC4200_2_00007FFDFB6FC420
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB75C3C00_2_00007FFDFB75C3C0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CE3F10_2_00007FFDFB6CE3F1
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6B42B00_2_00007FFDFB6B42B0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6FE2A00_2_00007FFDFB6FE2A0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CE33D0_2_00007FFDFB6CE33D
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6F03400_2_00007FFDFB6F0340
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D11F00_2_00007FFDFB7D11F0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7632400_2_00007FFDFB763240
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6D21700_2_00007FFDFB6D2170
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6EC1F00_2_00007FFDFB6EC1F0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7DE1D40_2_00007FFDFB7DE1D4
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CE0D80_2_00007FFDFB6CE0D8
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7440F00_2_00007FFDFB7440F0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6F90C00_2_00007FFDFB6F90C0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6F80B00_2_00007FFDFB6F80B0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7CA11C0_2_00007FFDFB7CA11C
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CE0860_2_00007FFDFB6CE086
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7077D00_2_00007FFDFB7077D0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CD7A00_2_00007FFDFB6CD7A0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6DA7900_2_00007FFDFB6DA790
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7047800_2_00007FFDFB704780
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7618400_2_00007FFDFB761840
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6CD83C0_2_00007FFDFB6CD83C
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6C26A00_2_00007FFDFB6C26A0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7637100_2_00007FFDFB763710
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6EA7100_2_00007FFDFB6EA710
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6DC6F00_2_00007FFDFB6DC6F0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6C75800_2_00007FFDFB6C7580
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6F86400_2_00007FFDFB6F8640
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7625A00_2_00007FFDFB7625A0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7005F30_2_00007FFDFB7005F3
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6C84800_2_00007FFDFB6C8480
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB6F14600_2_00007FFDFB6F1460
Source: C:\Windows\System32\loaddll64.exeCode function: String function: 00007FFDFB75FA20 appears 82 times
Source: C:\Windows\System32\loaddll64.exeCode function: String function: 00007FFDFB760F10 appears 31 times
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7556 -s 396
Source: file.dllBinary or memory string: OriginalFilenamefmod64.dll* vs file.dll
Source: classification engineClassification label: clean7.winDLL@116/9@1/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7572
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7556
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7504:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3724ca42-35e6-43b0-b905-824d05bee4cdJump to behavior
Source: file.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\file.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7556 -s 396
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7572 -s 404
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@Z
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@Z
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@Z
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@Z
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Update
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UnlockDSP
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UnloadPlugin
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetUserData
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetStreamBufferSize
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSpeakerPosition
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSoftwareFormat
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSoftwareChannels
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetReverbProperties
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetPluginPath
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetOutputByPlugin
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetOutput
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetNetworkTimeout
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetNetworkProxy
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetGeometrySettings
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetFileSystem
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetDriver
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetDSPBufferSize
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetCallback
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetAdvancedSettings
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DSettings
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DRolloffCallback
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DNumListeners
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DListenerAttributes
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Release
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_RegisterOutput
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@ZJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@ZJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@ZJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@ZJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@ZJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@ZJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UpdateJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UnlockDSPJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UnloadPluginJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetUserDataJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetStreamBufferSizeJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSpeakerPositionJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSoftwareFormatJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSoftwareChannelsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetReverbPropertiesJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetPluginPathJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetOutputByPluginJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetOutputJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetNetworkTimeoutJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetNetworkProxyJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetGeometrySettingsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetFileSystemJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetDriverJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetDSPBufferSizeJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetCallbackJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetAdvancedSettingsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DSettingsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DRolloffCallbackJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DNumListenersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DListenerAttributesJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_ReleaseJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_RegisterOutputJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7556 -s 396Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: winmmbase.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.dllStatic PE information: More than 1090 > 100 exports found
Source: file.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: file.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: file.dllStatic file information: File size 1756672 > 1048576
Source: file.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x12ec00
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\platforms\win\vs2012\_builds\lowlevel_api\Release Dynamic\x64\fmod64.pdb source: loaddll64.exe, 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1903303766.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1891244645.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.1902135714.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D4BA4 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00007FFDFB7D4BA4
Source: file.dllStatic PE information: section name: _RDATA
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\loaddll64.exeAPI coverage: 3.3 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7CC600 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExW,_errno,_errno,_wfullpath,_errno,_errno,_errno,_wfullpath,IsRootUNCName,GetDriveTypeW,free,__loctotime64_t,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,__loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,__loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,__loctotime64_t,FindClose,__wdtoxmode,_errno,GetLastError,_dosmaperr,FindClose,0_2_00007FFDFB7CC600
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D4BA4 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00007FFDFB7D4BA4
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D4BA4 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00007FFDFB7D4BA4
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D4BA4 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00007FFDFB7D4BA4
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D19C8 GetProcessHeap,0_2_00007FFDFB7D19C8
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7CA99C SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FFDFB7CA99C
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7D4040 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FFDFB7D4040
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB7DDD6C _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,_getenv_helper_nolock,free,_malloc_crt,_invoke_watson,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_00007FFDFB7DDD6C
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory51
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1521607 Sample: file.exe Startdate: 29/09/2024 Architecture: WINDOWS Score: 7 24 15.164.165.52.in-addr.arpa 2->24 8 loaddll64.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 31 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 16 12->20         started        process6 22 WerFault.exe 20 16 18->22         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
15.164.165.52.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.8.drfalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1521607
    Start date and time:2024-09-29 01:02:18 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 31s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:42
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:file.dll
    (renamed file extension from exe to dll)
    Original Sample Name:file.exe
    Detection:CLEAN
    Classification:clean7.winDLL@116/9@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 116
    • Exclude process from analysis (whitelisted): WerFault.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • VT rate limit hit for: file.dll
    TimeTypeDescription
    19:03:31API Interceptor2x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.7949748094606454
    Encrypted:false
    SSDEEP:192:ZvFi6y67SoH0sUSrEjlUuzuiFBZ24lO8p:zinmSxsUSojHzuiFBY4lO8p
    MD5:EBBA7DCA8FC55BC16DFE87F8C737EF84
    SHA1:722F57FD111D26DFB6A3FA3F34B34CAF9E3DD62C
    SHA-256:4CF20E085908C63A413EA26624CF64E3C85C8523C67937BD578AE91E968D63EE
    SHA-512:D734567754D437A28AE8391EEFB31832CF26BDE07F4ADB13B312B1FC8B6DF61CA8BFB1A16BCAF0926BE75ED631FEB42F88064B0558C05D030BD4D78DDC08A435
    Malicious:false
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.3.8.1.9.0.9.6.0.1.0.3.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.3.8.1.9.1.4.7.5.7.2.7.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.a.6.e.1.3.e.4.-.4.f.e.f.-.4.b.b.b.-.a.0.2.c.-.a.d.0.1.7.4.b.e.2.5.2.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.c.d.c.3.e.c.9.-.4.f.6.a.-.4.1.b.4.-.8.3.8.5.-.2.9.1.4.7.f.0.0.2.f.b.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.9.4.-.0.0.0.1.-.0.0.1.4.-.4.9.8.c.-.b.2.9.6.f.a.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.7951191400108398
    Encrypted:false
    SSDEEP:192:AhZFi5y6noH0sUSrEjlUuzuiFBZ24lO8p:CrisaxsUSojHzuiFBY4lO8p
    MD5:B35257C3B252943B65CBE6DFB6D76B77
    SHA1:E6A60FC53B4E5DA3320204D3044F4230736D2879
    SHA-256:D4B850CF5B41AA6707179824BB3C071D8A018718ACD67B76C1DCD75EBAB622C9
    SHA-512:5F2826921877D1921A637819CEF1940CBE417CFBEE4489DA40BA37B7D21D4A70997CA8EB0C4EDB3CB9BCB34DC2BC93953CAA22E9EB69530389344A1489D2C2DD
    Malicious:false
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.3.8.1.9.0.9.5.9.9.7.7.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.3.8.1.9.1.5.0.6.8.5.2.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.5.0.f.8.e.1.-.b.c.c.e.-.4.3.f.1.-.9.9.c.7.-.0.a.8.4.4.c.8.f.0.f.9.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.9.4.8.a.3.6.7.-.9.7.0.a.-.4.9.f.b.-.9.3.a.0.-.3.0.8.1.6.7.0.f.9.b.0.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.8.4.-.0.0.0.1.-.0.0.1.4.-.a.a.d.b.-.b.0.9.6.f.a.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 23:03:11 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):57424
    Entropy (8bit):1.6954756020482875
    Encrypted:false
    SSDEEP:192:GTLibtDrFzmXOMxnYd71w84ykSkEX3NDL3FemZ:VbdFzm+zd7lkSkEp3FV
    MD5:652FCF3F85DE1D04ED8906735EFBDCFC
    SHA1:F07E6EA27AF462D96EB7B9808C08CCB7FD304D75
    SHA-256:416C613B291F4C9C862A3E24A17A6CC8DC008AC99E464EA694040868AA0DC1E8
    SHA-512:9C2A7406D77E7B077E49A5AB128BF8D5EA007514BE2B5F9B46AC559CA5D7234EF3EC5888111BC0FE82C4383232CCC33AF328645B3597A30BFF9A586ACB6DEA68
    Malicious:false
    Preview:MDMP..a..... ......./..f........................h................+..........T.......8...........T.......................................................................................................................eJ..............Lw......................T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 23:03:11 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):55836
    Entropy (8bit):1.7439181172835743
    Encrypted:false
    SSDEEP:192:GzbbtDrY6OMxK9iyE////Xpvcw/Ohch1tO0QPfy/d:4bbdYFl9iv///5VOhcjtO1Xyl
    MD5:E10E04DAAE2F615DDBCD1C5B7573699D
    SHA1:EAF60A743B61459F4EDF91D5D213E6C8FEE09E97
    SHA-256:5F14DB42AC4012ECAA5D2ABB56D3E16C3D251032143B03142D8924BD43481D18
    SHA-512:28BD32FE82EA21B13E887F11A45224D8B2E5FA736CBF335AEAFB48652C2FCCCC25B4165F79E70940D568724AF28064FE5102E2C60F2C7ADB1CDF142ED5FA8ACB
    Malicious:false
    Preview:MDMP..a..... ......./..f........................h................+..........T.......8...........T.......................................................................................................................eJ..............Lw......................T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8758
    Entropy (8bit):3.6994799528119047
    Encrypted:false
    SSDEEP:192:R6l7wVeJkc896Y9XWgmfiLiijeprt89b/uCfOwVm:R6lXJP+6YNWgmfGii9/7fO/
    MD5:D03A9344114C637308DC30EDAA56F034
    SHA1:498B1CB19540061F804B638BA30D97DDE80069E4
    SHA-256:6FD02881BC45F06541627E3DBF38A9A06790B1E0B43F802FAD4CA8245FC6EC3B
    SHA-512:55DE67387A5499BC239F8812B99C084484AB5AEBCD9EEADB1F77F7D2784FCBEB9C1330CF19BAC0A3BE711458DD74DCF74DDF0246F74631E28F1AA2F198D440F2
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.5.6.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8764
    Entropy (8bit):3.699227555910906
    Encrypted:false
    SSDEEP:192:R6l7wVeJiSG6Y9EC5gmfiLiijepr+89b/5CftVm:R6lXJXG6YOUgmfGiiw/cfe
    MD5:62674E498F6773D11C8CB08339E17369
    SHA1:8542ADB74F274E35D24698CF2A739FCD15B390EF
    SHA-256:B36DD18448642C4333FE591C14E6DC6CE857CDFE25940F570747F251A63DD3E5
    SHA-512:145950BEAC0D0014F0E17C1050A4286809F54E884017284512B4138C4CBA892C9199ACCD2B0B9EC260846F69FB079104B155D88469B1808AAC3E08FBAFA4A6BD
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.7.2.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4742
    Entropy (8bit):4.466602579345646
    Encrypted:false
    SSDEEP:48:cvIwWl8zs4Jg771I98iXyWpW8VY7Ym8M4JCFCtFfFgyq85mwIvptSTSvd:uIjf+I7Hij7VXJzKJvpoOvd
    MD5:48A8A9238B71444B3C2100BB7CC1F2B2
    SHA1:DDFBCC4258BA89C607A78C96ABCAA48DE3356D48
    SHA-256:0B3049CFC53259F1D2F7BFE00AF5D5D150E107A0622B00C44DE4C48F720A1374
    SHA-512:73D7D7C17D9B17FC5A0F6325BBFD16AB35CCD09830218C6F64CAF2F02C1EF112CBC881F8D4AB0100E5AA911CE7EDF606B82810CB07BC2446C5CBA7B3C6E82CE2
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520685" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4742
    Entropy (8bit):4.468583848383712
    Encrypted:false
    SSDEEP:48:cvIwWl8zs4Jg771I98iXyWpW8VYZYm8M4JCFCtFfFeyq85mwIRYptSTSSd:uIjf+I7Hij7VNJz4JRYpoOSd
    MD5:BCE64B1C3FCCA72A4FF0BD992D779FB9
    SHA1:EEEDB5F160ED2E2DAA5031EAD40EDECAC691B836
    SHA-256:95DD137CE1BB924C592378D58E00802BF583BB719045B52541D349628B2D51B5
    SHA-512:8872A2DABC5BE8D820A321D07E7CDF25C27214AC8E922C8778C13C9E9B79A881D0A43834A43770D69235BF8B2031DE12D8E297240188D3A17501481AEB1C9276
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520685" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.466412013393424
    Encrypted:false
    SSDEEP:6144:UIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNcdwBCswSb9:pXD94zWlLZMM6YFHa+9
    MD5:24A3F0BD019CFC91749F10A676254AC3
    SHA1:5A68D12506136AC35254F755B0025D6EB784923B
    SHA-256:6CBC339364DB82C51CEAE61F5CD193B997BB8F61728126E1C6340267F35F2B2C
    SHA-512:CE27B42B9AD87FC557DEF8E27B8659A04C4E4BE733A352814D5E7E7D4DF5CF50BC96627825EBE305D9DE0388764FEFB1C88AF24268680814DDE47BC63443E85C
    Malicious:false
    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.<............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Entropy (8bit):6.650966647839274
    TrID:
    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
    • Win64 Executable (generic) (12005/4) 10.17%
    • Generic Win/DOS Executable (2004/3) 1.70%
    • DOS Executable Generic (2002/1) 1.70%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
    File name:file.dll
    File size:1'756'672 bytes
    MD5:2fe5ff05cdaef7b6539ed20a44aabdeb
    SHA1:d575cf3063ac1f573a5a36587db26a7fb2418946
    SHA256:637c98d2e6251df15fc64ba436009706269bfa9d7b1316e43a79575f7891f622
    SHA512:1a589df0216dd8edeef64e380974bcc8674fcfe3275abdbaccd271273e2c5c2ad55c62fd0aab41f0fbfcad1791c15a5957e2ea382952095d079f50737e723457
    SSDEEP:24576:qyJqfoL6dV1i3eBMz7XfRxQQx2HnxMPGqCQKwZU+seTLvxd9BiiL:qyMoL6k3eBoRx8LeUY/5B
    TLSH:83859F8271F480E8E527D13D625BB72BF67230540F206BDF0BE046A96FA3BD15A7A351
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._.XN..6...6...6.......6..H..0.6..H....6..H..;.6.......6.......6.......6.......6...7...6.}`....6.}`..2.6.}`....6.}`....6.......6
    Icon Hash:7ae282899bbab082
    Entrypoint:0x180117950
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x180000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x5CD41416 [Thu May 9 11:50:46 2019 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:0f806537913df98304a9550a58864e5c
    Instruction
    dec eax
    mov dword ptr [esp+08h], ebx
    dec eax
    mov dword ptr [esp+10h], esi
    push edi
    dec eax
    sub esp, 20h
    dec ecx
    mov edi, eax
    mov ebx, edx
    dec eax
    mov esi, ecx
    cmp edx, 01h
    jne 00007FE0B856E707h
    call 00007FE0B857ADD4h
    dec esp
    mov eax, edi
    mov edx, ebx
    dec eax
    mov ecx, esi
    dec eax
    mov ebx, dword ptr [esp+30h]
    dec eax
    mov esi, dword ptr [esp+38h]
    dec eax
    add esp, 20h
    pop edi
    jmp 00007FE0B856E708h
    int3
    int3
    int3
    dec eax
    mov eax, esp
    dec eax
    mov dword ptr [eax+20h], ebx
    dec esp
    mov dword ptr [eax+18h], eax
    mov dword ptr [eax+10h], edx
    dec eax
    mov dword ptr [eax+08h], ecx
    push esi
    push edi
    inc ecx
    push esi
    dec eax
    sub esp, 50h
    dec ecx
    mov esi, eax
    mov ebx, edx
    dec esp
    mov esi, ecx
    mov edx, 00000001h
    mov dword ptr [eax-48h], edx
    test ebx, ebx
    jne 00007FE0B856E711h
    cmp dword ptr [000C4854h], ebx
    jne 00007FE0B856E709h
    xor eax, eax
    jmp 00007FE0B856E7D7h
    lea eax, dword ptr [ebx-01h]
    cmp eax, 01h
    jnbe 00007FE0B856E73Ah
    dec eax
    mov eax, dword ptr [00046F3Ch]
    dec eax
    test eax, eax
    je 00007FE0B856E70Ch
    mov edx, ebx
    call eax
    mov edx, eax
    mov dword ptr [esp+20h], eax
    test edx, edx
    je 00007FE0B856E719h
    dec esp
    mov eax, esi
    mov edx, ebx
    dec ecx
    mov ecx, esi
    call 00007FE0B856E4F9h
    mov edx, eax
    mov dword ptr [esp+20h], eax
    test eax, eax
    jne 00007FE0B856E709h
    xor eax, eax
    jmp 00007FE0B856E797h
    dec esp
    mov eax, esi
    mov edx, ebx
    dec ecx
    mov ecx, esi
    call 00007FE0B857ADD7h
    Programming Language:
    • [C++] VS2008 SP1 build 30729
    • [ C ] VS2010 SP1 build 40219
    • [ C ] VS2008 SP1 build 30729
    • [IMP] VS2008 SP1 build 30729
    • [C++] VS2012 UPD4 build 61030
    • [ C ] VS2012 UPD4 build 61030
    • [EXP] VS2012 UPD4 build 61030
    • [RES] VS2012 UPD4 build 61030
    • [LNK] VS2012 UPD4 build 61030
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x17cd900xd21b.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x17bd800xa0.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1f00000x548.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1df0000xdadc.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1f10000x159c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x1305b00x38.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1659b00x70.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x1300000x510.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x12ea2c0x12ec00e8f99b0e8686ad4f009b6a4e516404c6False0.4858394405450041zlib compressed data6.444263076867181IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x1300000x59fab0x5a00003daf9d156761632a1ca3ed4e8584963False0.3670844184027778data6.567532782843111IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x18a0000x542c00x1020097313a6619e902104afc57f427386643False0.4328972868217054data5.488908258648024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x1df0000xdadc0xdc00e52b9a6e49b3d989eb7067e0dd83ca01False0.48469460227272726data6.162163839127236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    _RDATA0x1ed0000x2f300x3000dac6390a1407d8780ca748c51021586dFalse0.330322265625data6.591707537409742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x1f00000x5480x600e5923031d46054a0d9e5dd1ee4f99b12False0.423828125data3.840519182614396IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x1f10000x29b20x2a008ecae029fe1ef77a9e00161509cb3cc2False0.20972842261904762data3.6621760857561863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x1f00a00x328dataEnglishUnited States0.4752475247524752
    RT_MANIFEST0x1f03c80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    WS2_32.dllfreeaddrinfo, getaddrinfo, WSAIoctl, WSAGetLastError, WSACleanup, WSAStartup, socket, shutdown, setsockopt, send, select, recv, listen, htons, htonl, getsockopt, ioctlsocket, connect, closesocket, bind, accept
    WINMM.dllwaveInReset, waveInStart, waveInAddBuffer, waveInUnprepareHeader, waveInPrepareHeader, waveInClose, waveInOpen, waveInGetDevCapsW, waveInGetNumDevs, waveOutGetPosition, waveOutReset, waveOutWrite, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutClose, waveOutOpen, waveOutGetDevCapsW, timeGetTime, waveOutGetNumDevs
    MSACM32.dllacmStreamOpen, acmStreamSize, acmStreamUnprepareHeader, acmStreamPrepareHeader, acmStreamConvert, acmFormatSuggest
    KERNEL32.dllGetFullPathNameW, PeekNamedPipe, GetFileInformationByHandle, SetEnvironmentVariableA, SetFilePointerEx, OutputDebugStringW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetSystemTimeAsFileTime, GetCurrentProcessId, GetModuleFileNameA, HeapSize, GetStringTypeW, GetProcessHeap, GetConsoleMode, GetConsoleCP, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, FileTimeToSystemTime, GetDriveTypeW, FindFirstFileExW, FindClose, FileTimeToLocalFileTime, AreFileApisANSI, ExitProcess, GetModuleHandleW, GetStartupInfoW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, TerminateProcess, InitializeCriticalSectionAndSpinCount, SetLastError, SetUnhandledExceptionFilter, UnhandledExceptionFilter, WaitForSingleObject, CloseHandle, CreateEventA, GetProcAddress, LoadLibraryA, FreeLibrary, GetCurrentThreadId, SetThreadPriority, GetLastError, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, ReleaseSemaphore, Sleep, GetFileSizeEx, WriteFile, ReadFile, FlushFileBuffers, SetFilePointer, CreateSemaphoreA, LoadLibraryW, CreateFileW, QueryPerformanceCounter, QueryPerformanceFrequency, MultiByteToWideChar, WideCharToMultiByte, GetSystemDirectoryA, RtlVirtualUnwind, RtlLookupFunctionEntry, GetCurrentDirectoryW, SetStdHandle, ReadConsoleW, GetCurrentProcess, RtlCaptureContext, SetEndOfFile, GetTimeZoneInformation, LCMapStringW, CompareStringW, IsDebuggerPresent, IsProcessorFeaturePresent, HeapFree, HeapAlloc, HeapReAlloc, EncodePointer, DecodePointer, CreateThread, ExitThread, LoadLibraryExW, RtlUnwindEx, GetCommandLineA, GetStdHandle, GetFileType, GetModuleFileNameW, GetModuleHandleExW, WriteConsoleW, RaiseException
    USER32.dllGetDesktopWindow
    ADVAPI32.dllRegEnumKeyExA, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExA, RegCloseKey
    ole32.dllPropVariantClear, CoTaskMemFree, CLSIDFromString, CoUninitialize, CoTaskMemAlloc, CoCreateGuid, CoCreateInstance, CoInitializeEx
    NameOrdinalAddress
    ?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z10x1800c3c30
    ?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@Z20x180009770
    ?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@Z30x1800098b0
    ?addGroup@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAV12@_NPEAPEAVDSPConnection@2@@Z40x18009a400
    ?addInput@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAV12@PEAPEAVDSPConnection@2@W4FMOD_DSPCONNECTION_TYPE@@@Z50x18009b120
    ?addPolygon@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@MM_NHPEBUFMOD_VECTOR@@PEAH@Z60x18009dbd0
    ?addSyncPoint@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@IIPEBDPEAPEAUFMOD_SYNCPOINT@@@Z70x18009fa00
    ?attachChannelGroupToPort@System@FMOD@@QEAA?AW4FMOD_RESULT@@I_KPEAVChannelGroup@2@_N@Z80x1800a5010
    ?attachFileSystem@System@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@PEBDPEAIPEAPEAXPEAX@ZP6A?AW43@33@ZP6A?AW43@33I13@ZP6A?AW43@3I3@Z@Z90x1800a51a0
    ?close@System@FMOD@@QEAA?AW4FMOD_RESULT@@XZ100x1800a5290
    ?createChannelGroup@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBDPEAPEAVChannelGroup@2@@Z110x1800a5360
    ?createClientProfile@SystemI@FMOD@@QEAA?AW4FMOD_RESULT@@XZ120x1800deef0
    ?createDSP@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_DSP_DESCRIPTION@@PEAPEAVDSP@2@@Z130x1800a54a0
    ?createDSPByPlugin@System@FMOD@@QEAA?AW4FMOD_RESULT@@IPEAPEAVDSP@2@@Z140x1800a55e0
    ?createDSPByType@System@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_DSP_TYPE@@PEAPEAVDSP@2@@Z150x1800a5710
    ?createDiskFile@SystemI@FMOD@@QEAA?AW4FMOD_RESULT@@PEBDPEAUFMOD_CREATESOUNDEXINFO@@PEAPEAVFile@2@PEA_N@Z160x1800fa390
    ?createGeometry@System@FMOD@@QEAA?AW4FMOD_RESULT@@HHPEAPEAVGeometry@2@@Z170x1800a5840
    ?createMemoryFile@SystemI@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVFile@2@@Z180x1800fa820
    ?createReverb3D@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVReverb3D@2@@Z190x1800a59c0
    ?createSound@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBDIPEAUFMOD_CREATESOUNDEXINFO@@PEAPEAVSound@2@@Z200x1800a5a90
    ?createSoundGroup@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBDPEAPEAVSoundGroup@2@@Z210x1800a5b70
    ?createStream@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBDIPEAUFMOD_CREATESOUNDEXINFO@@PEAPEAVSound@2@@Z220x1800a5cb0
    ?deleteSyncPoint@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_SYNCPOINT@@@Z230x18009fb60
    ?detachChannelGroupFromPort@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAVChannelGroup@2@@Z240x1800a5d90
    ?disconnectAll@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@_N0@Z250x18009b280
    ?disconnectFrom@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAV12@PEAVDSPConnection@2@@Z260x18009b3c0
    ?get3DAttributes@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@00@Z270x1800099f0
    ?get3DAttributes@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@PEAM1@Z280x18009edd0
    ?get3DConeOrientation@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@@Z290x180009b80
    ?get3DConeSettings@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM00@Z300x180009c60
    ?get3DConeSettings@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM00@Z310x18009fc90
    ?get3DCustomRolloff@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAUFMOD_VECTOR@@PEAH@Z320x180009df0
    ?get3DCustomRolloff@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAUFMOD_VECTOR@@PEAH@Z330x18009fe70
    ?get3DDistanceFilter@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_NPEAM1@Z340x180009f30
    ?get3DDopplerLevel@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z350x18000a0c0
    ?get3DLevel@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z360x18000a1a0
    ?get3DListenerAttributes@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAUFMOD_VECTOR@@000@Z370x1800a5e60
    ?get3DMinMaxDistance@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM0@Z380x18000a280
    ?get3DMinMaxDistance@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM0@Z390x1800a0000
    ?get3DNumListeners@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z400x1800a5f70
    ?get3DOcclusion@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM0@Z410x18000a3c0
    ?get3DSettings@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM00@Z420x1800a6040
    ?get3DSpread@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z430x18000a500
    ?getActive@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z440x18009b500
    ?getActive@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z450x18009dc50
    ?getActive@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z460x18009ef10
    ?getAdvancedSettings@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_ADVANCEDSETTINGS@@@Z470x1800a61c0
    ?getAsyncThread@AsyncThread@FMOD@@SA?AW4FMOD_RESULT@@PEAVSystemI@2@HPEAPEAV12@@Z480x1800c3d00
    ?getAudibility@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z490x18000a5e0
    ?getBypass@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z500x18009b5e0
    ?getCPUUsage@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAI0@Z510x18009b6c0
    ?getCPUUsage@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM0000@Z520x1800a6290
    ?getChannel@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAVChannel@2@@Z530x18009a510
    ?getChannel@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAVChannel@2@@Z540x1800a6380
    ?getChannelFormat@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAIPEAHPEAW4FMOD_SPEAKERMODE@@@Z550x18009b800
    ?getChannelGroup@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVChannelGroup@2@@Z560x180099630
    ?getChannelsPlaying@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH0@Z570x1800a64b0
    ?getCurrentSound@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVSound@2@@Z580x180099710
    ?getDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAVDSP@2@@Z590x18000a6c0
    ?getDSPBufferSize@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAIPEAH@Z600x1800a65b0
    ?getDSPClock@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_K0@Z610x18000a800
    ?getDSPIndex@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAVDSP@2@PEAH@Z620x18000a930
    ?getDSPInfoByPlugin@System@FMOD@@QEAA?AW4FMOD_RESULT@@IPEAPEBUFMOD_DSP_DESCRIPTION@@@Z630x1800a66f0
    ?getDataParameterIndex@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAH@Z640x18009b980
    ?getDefaultMixMatrix@System@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_SPEAKERMODE@@0PEAMH@Z650x1800a6820
    ?getDefaults@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAMPEAH@Z660x1800a0190
    ?getDelay@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_K0PEA_N@Z670x18000aa70
    ?getDriver@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z680x1800a68f0
    ?getDriverInfo@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEADHPEAUFMOD_GUID@@PEAHPEAW4FMOD_SPEAKERMODE@@2@Z690x1800a69c0
    ?getFadePoints@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAIPEA_KPEAM@Z700x18000ac10
    ?getFileUsage@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_J00@Z710x1800a6af0
    ?getFormat@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAW4FMOD_SOUND_TYPE@@PEAW4FMOD_SOUND_FORMAT@@PEAH2@Z720x1800a02f0
    ?getFrequency@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z730x1800997f0
    ?getGeometryOcclusion@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_VECTOR@@0PEAM1@Z740x1800a6c30
    ?getGeometrySettings@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z750x1800a6d20
    ?getGlobals@FMOD@@YAXPEAPEAVGlobal@1@@Z760x1800d1200
    ?getGroup@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAV12@@Z770x18009a640
    ?getIdle@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z780x18009ba80
    ?getIndex@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z790x1800998d0
    ?getInfo@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEADPEAIPEAH22@Z800x18009bb50
    ?getInput@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAV12@PEAPEAVDSPConnection@2@@Z810x18009bc40
    ?getInput@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVDSP@2@@Z820x180053f80
    ?getLength@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAII@Z830x1800a0430
    ?getLoopCount@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z840x1800999b0
    ?getLoopCount@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z850x1800a05c0
    ?getLoopPoints@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAII0I@Z860x180099a90
    ?getLoopPoints@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAII0I@Z870x1800a06e0
    ?getLowPassGain@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z880x18000adc0
    ?getMasterChannelGroup@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVChannelGroup@2@@Z890x1800a6df0
    ?getMasterSoundGroup@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVSoundGroup@2@@Z900x1800a6eb0
    ?getMaxAudible@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z910x1800a3440
    ?getMaxAudibleBehavior@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAW4FMOD_SOUNDGROUP_BEHAVIOR@@@Z920x1800a3510
    ?getMaxPolygons@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH0@Z930x18009dc80
    ?getMeteringEnabled@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N0@Z940x18009bdd0
    ?getMeteringInfo@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_DSP_METERING_INFO@@0@Z950x18009bf10
    ?getMix@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z960x180054050
    ?getMixMatrix@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAMPEAH1H@Z970x18000aea0
    ?getMixMatrix@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@PEAMPEAH1H@Z980x180054120
    ?getMode@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAI@Z990x18000afa0
    ?getMode@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAI@Z1000x1800a0830
    ?getMusicChannelVolume@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAM@Z1010x1800a0950
    ?getMusicNumChannels@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1020x1800a0b20
    ?getMusicSpeed@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z1030x1800a0c80
    ?getMute@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z1040x18000b080
    ?getMuteFadeSpeed@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z1050x1800a35e0
    ?getName@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEADH@Z1060x18009a770
    ?getName@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEADH@Z1070x1800a0de0
    ?getName@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEADH@Z1080x1800a36b0
    ?getNestedPlugin@System@FMOD@@QEAA?AW4FMOD_RESULT@@IHPEAI@Z1090x1800a6f80
    ?getNetworkProxy@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEADH@Z1100x1800a7100
    ?getNetworkTimeout@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1110x1800a7240
    ?getNumChannels@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1120x18009a8b0
    ?getNumDSPs@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1130x18000b160
    ?getNumDrivers@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1140x1800a7310
    ?getNumGroups@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1150x18009a980
    ?getNumInputs@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1160x18009c050
    ?getNumNestedPlugins@System@FMOD@@QEAA?AW4FMOD_RESULT@@IPEAH@Z1170x1800a73e0
    ?getNumOutputs@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1180x18009c130
    ?getNumParameters@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1190x18009c210
    ?getNumPlaying@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1200x1800a37f0
    ?getNumPlugins@System@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_PLUGINTYPE@@PEAH@Z1210x1800a7510
    ?getNumPolygons@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1220x18009dcc0
    ?getNumSounds@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1230x1800a38c0
    ?getNumSubSounds@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1240x1800a0f70
    ?getNumSyncPoints@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1250x1800a1090
    ?getNumTags@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH0@Z1260x1800a11c0
    ?getOpenState@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAW4FMOD_OPENSTATE@@PEAIPEA_N2@Z1270x1800a1350
    ?getOutput@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAV12@PEAPEAVDSPConnection@2@@Z1280x18009c2d0
    ?getOutput@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVDSP@2@@Z1290x180054210
    ?getOutput@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAW4FMOD_OUTPUTTYPE@@@Z1300x1800a7640
    ?getOutputByPlugin@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAI@Z1310x1800a7710
    ?getOutputChannelFormat@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@IHW4FMOD_SPEAKERMODE@@PEAIPEAHPEAW44@@Z1320x18009c460
    ?getOutputHandle@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1330x1800a77e0
    ?getParameterBool@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEA_NPEADH@Z1340x18009c580
    ?getParameterData@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAXPEAIPEADH@Z1350x18009c660
    ?getParameterFloat@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAMPEADH@Z1360x18009c750
    ?getParameterInfo@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAUFMOD_DSP_PARAMETER_DESC@@@Z1370x18009c830
    ?getParameterInt@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAHPEADH@Z1380x18009c930
    ?getParentGroup@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAV12@@Z1390x18009aa50
    ?getPaused@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z1400x18000b240
    ?getPitch@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z1410x18000b320
    ?getPluginHandle@System@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_PLUGINTYPE@@HPEAI@Z1420x1800a78b0
    ?getPluginInfo@System@FMOD@@QEAA?AW4FMOD_RESULT@@IPEAW4FMOD_PLUGINTYPE@@PEADHPEAI@Z1430x1800a7a30
    ?getPolygonAttributes@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAM0PEA_N@Z1440x18009dcf0
    ?getPolygonNumVertices@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAH@Z1450x18009dd50
    ?getPolygonVertex@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@HHPEAUFMOD_VECTOR@@@Z1460x18009dd90
    ?getPosition@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAII@Z1470x180099b90
    ?getPosition@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@@Z1480x18009dde0
    ?getPriority@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1490x180099cd0
    ?getProperties@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_REVERB_PROPERTIES@@@Z1500x18009efd0
    ?getRecordDriverInfo@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEADHPEAUFMOD_GUID@@PEAHPEAW4FMOD_SPEAKERMODE@@2PEAI@Z1510x1800a7b40
    ?getRecordNumDrivers@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH0@Z1520x1800a7c90
    ?getRecordPosition@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAI@Z1530x1800a7dd0
    ?getReverbProperties@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAM@Z1540x18000b400
    ?getReverbProperties@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAUFMOD_REVERB_PROPERTIES@@@Z1550x1800a7f00
    ?getRotation@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@0@Z1560x18009de10
    ?getScale@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@@Z1570x18009de50
    ?getSoftwareChannels@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z1580x1800a8030
    ?getSoftwareFormat@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAHPEAW4FMOD_SPEAKERMODE@@0@Z1590x1800a8100
    ?getSound@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAVSound@2@@Z1600x1800a3990
    ?getSoundGroup@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVSoundGroup@2@@Z1610x1800a1450
    ?getSoundRAM@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH00@Z1620x1800a82a0
    ?getSpeakerModeChannels@System@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_SPEAKERMODE@@PEAH@Z1630x1800a8420
    ?getSpeakerPosition@System@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_SPEAKER@@PEAM1PEA_N@Z1640x1800a84f0
    ?getStreamBufferSize@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAI0@Z1650x1800a85e0
    ?getSubSound@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAV12@@Z1660x1800a1570
    ?getSubSoundParent@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAV12@@Z1670x1800a16c0
    ?getSyncPoint@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAPEAUFMOD_SYNCPOINT@@@Z1680x1800a1700
    ?getSyncPointInfo@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_SYNCPOINT@@PEADHPEAII@Z1690x1800a1890
    ?getSystemObject@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVSystem@2@@Z1700x18000b530
    ?getSystemObject@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVSystem@2@@Z1710x18009ca10
    ?getSystemObject@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVSystem@2@@Z1720x1800a19f0
    ?getSystemObject@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAVSystem@2@@Z1730x1800a3ac0
    ?getTag@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEBDHPEAUFMOD_TAG@@@Z1740x1800a1ab0
    ?getType@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAW4FMOD_DSP_TYPE@@@Z1750x18009cad0
    ?getType@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@PEAW4FMOD_DSPCONNECTION_TYPE@@@Z1760x1800542e0
    ?getUserData@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1770x18000b5f0
    ?getUserData@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1780x18009cba0
    ?getUserData@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1790x1800543b0
    ?getUserData@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1800x18009de80
    ?getUserData@GeometryI@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1810x1800cf2f0
    ?getUserData@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1820x18009f090
    ?getUserData@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1830x1800a1c90
    ?getUserData@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1840x1800a3b90
    ?getUserData@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1850x1800a8720
    ?getUserDataInternal@SoundI@FMOD@@QEAA?AW4FMOD_RESULT@@PEAPEAX@Z1860x1800dbe50
    ?getVersion@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAI@Z1870x1800a87e0
    ?getVolume@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z1880x18000b6c0
    ?getVolume@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM@Z1890x1800a3c60
    ?getVolumeRamp@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z1900x18000b7a0
    ?getWetDryMix@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAM00@Z1910x18009cc60
    ?init@System@FMOD@@QEAA?AW4FMOD_RESULT@@HIPEAX@Z1920x1800a88b0
    ?isPlaying@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z1930x18000b880
    ?isRecording@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEA_N@Z1940x1800a89f0
    ?isVirtual@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEA_N@Z1950x180099db0
    ?loadGeometry@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBXHPEAPEAVGeometry@2@@Z1960x1800a8b20
    ?loadPlugin@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBDPEAII@Z1970x1800a8ca0
    ?lock@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@IIPEAPEAX0PEAI1@Z1980x1800a1d50
    ?lockDSP@System@FMOD@@QEAA?AW4FMOD_RESULT@@XZ1990x1800a8e20
    ?mixerResume@System@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2000x1800a8ec0
    ?mixerSuspend@System@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2010x1800a8f80
    ?playDSP@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAVDSP@2@PEAVChannelGroup@2@_NPEAPEAVChannel@2@@Z2020x1800a9040
    ?playSound@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAVSound@2@PEAVChannelGroup@2@_NPEAPEAVChannel@2@@Z2030x1800a9140
    ?readData@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAXIPEAI@Z2040x1800a1ed0
    ?recordStart@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVSound@2@_N@Z2050x1800a9240
    ?recordStop@System@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z2060x1800a93c0
    ?registerCodec@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_CODEC_DESCRIPTION@@PEAII@Z2070x1800a9490
    ?registerDSP@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_DSP_DESCRIPTION@@PEAI@Z2080x1800a9610
    ?registerOutput@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_OUTPUT_DESCRIPTION@@PEAI@Z2090x1800a9750
    ?release@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2100x18009ab20
    ?release@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2110x18009cde0
    ?release@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2120x18009deb0
    ?release@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2130x18009f150
    ?release@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2140x1800a20b0
    ?release@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2150x1800a3d30
    ?release@System@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2160x1800a9890
    ?removeCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z2170x1800c3ff0
    ?removeDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAVDSP@2@@Z2180x18000b960
    ?removeFadePoints@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_K0@Z2190x18000ba40
    ?reset@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@XZ2200x18009cea0
    ?save@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEAXPEAH@Z2210x18009dee0
    ?seekData@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@I@Z2220x1800a2190
    ?set3DAttributes@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_VECTOR@@00@Z2230x18000bb80
    ?set3DAttributes@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_VECTOR@@MM@Z2240x18009f1f0
    ?set3DConeOrientation@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@@Z2250x18000bd10
    ?set3DConeSettings@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@MMM@Z2260x18000bdf0
    ?set3DConeSettings@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@MMM@Z2270x1800a22c0
    ?set3DCustomRolloff@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@H@Z2280x18000bf90
    ?set3DCustomRolloff@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_VECTOR@@H@Z2290x1800a24e0
    ?set3DDistanceFilter@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_NMM@Z2300x18000c0d0
    ?set3DDopplerLevel@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2310x18000c260
    ?set3DLevel@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2320x18000c340
    ?set3DListenerAttributes@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEBUFMOD_VECTOR@@000@Z2330x1800a9960
    ?set3DMinMaxDistance@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@MM@Z2340x18000c420
    ?set3DMinMaxDistance@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@MM@Z2350x1800a26a0
    ?set3DNumListeners@System@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z2360x1800a9a70
    ?set3DOcclusion@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@MM@Z2370x18000c570
    ?set3DRolloffCallback@System@FMOD@@QEAA?AW4FMOD_RESULT@@P6AMPEAUFMOD_CHANNELCONTROL@@M@Z@Z2380x1800a9b40
    ?set3DSettings@System@FMOD@@QEAA?AW4FMOD_RESULT@@MMM@Z2390x1800a9c10
    ?set3DSpread@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2400x18000c6c0
    ?setActive@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@_N@Z2410x18009cf60
    ?setActive@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@_N@Z2420x18009df20
    ?setActive@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@_N@Z2430x18009f2b0
    ?setAdvancedSettings@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAUFMOD_ADVANCEDSETTINGS@@@Z2440x1800a9db0
    ?setBypass@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@_N@Z2450x18009d040
    ?setCallback@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@PEAUFMOD_CHANNELCONTROL@@W4FMOD_CHANNELCONTROL_TYPE@@W4FMOD_CHANNELCONTROL_CALLBACK_TYPE@@PEAX3@Z@Z2460x18000c7a0
    ?setCallback@System@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@PEAUFMOD_SYSTEM@@IPEAX11@ZI@Z2470x1800a9e80
    ?setChannelFormat@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@IHW4FMOD_SPEAKERMODE@@@Z2480x18009d120
    ?setChannelGroup@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@PEAVChannelGroup@2@@Z2490x180099e90
    ?setDSPBufferSize@System@FMOD@@QEAA?AW4FMOD_RESULT@@IH@Z2500x1800a9fc0
    ?setDSPIndex@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAVDSP@2@H@Z2510x18000c880
    ?setDefaults@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@MH@Z2520x1800a2850
    ?setDelay@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_K0_N@Z2530x18000c9c0
    ?setDriver@System@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z2540x1800aa0f0
    ?setFadePointRamp@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@Z2550x18000cb50
    ?setFileSystem@System@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@PEBDPEAIPEAPEAXPEAX@ZP6A?AW43@33@ZP6A?AW43@33I13@ZP6A?AW43@3I3@ZP6A?AW43@PEAUFMOD_ASYNCREADINFO@@3@Z9H@Z2560x1800aa1c0
    ?setFrequency@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2570x180099f60
    ?setGeometrySettings@System@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2580x1800aa300
    ?setLoopCount@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z2590x18009a040
    ?setLoopCount@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z2600x1800a2a00
    ?setLoopPoints@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@IIII@Z2610x18009a110
    ?setLoopPoints@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@IIII@Z2620x1800a2b30
    ?setLowPassGain@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2630x18000cc90
    ?setMaxAudible@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z2640x1800a3df0
    ?setMaxAudibleBehavior@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_SOUNDGROUP_BEHAVIOR@@@Z2650x1800a3ec0
    ?setMeteringEnabled@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@_N0@Z2660x18009d2a0
    ?setMix@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2670x180054480
    ?setMixLevelsInput@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAMH@Z2680x18000cd70
    ?setMixLevelsOutput@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@MMMMMMMM@Z2690x18000ceb0
    ?setMixMatrix@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAMHHH@Z2700x18000d060
    ?setMixMatrix@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@PEAMHHH@Z2710x180054570
    ?setMode@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@I@Z2720x18000d160
    ?setMode@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@I@Z2730x1800a2c80
    ?setMusicChannelVolume@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@HM@Z2740x1800a2db0
    ?setMusicSpeed@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2750x1800a2f80
    ?setMute@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_N@Z2760x18000d240
    ?setMuteFadeSpeed@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2770x1800a3f90
    ?setNetworkProxy@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBD@Z2780x1800aa3e0
    ?setNetworkTimeout@System@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z2790x1800aa4b0
    ?setOutput@System@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_OUTPUTTYPE@@@Z2800x1800aa580
    ?setOutputByPlugin@System@FMOD@@QEAA?AW4FMOD_RESULT@@I@Z2810x1800aa650
    ?setPan@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2820x18000d320
    ?setParameterBool@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@H_N@Z2830x18009d3e0
    ?setParameterData@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAXI@Z2840x18009d4e0
    ?setParameterFloat@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HM@Z2850x18009d620
    ?setParameterInt@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@HH@Z2860x18009d730
    ?setPaused@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_N@Z2870x18000d400
    ?setPitch@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z2880x18000d4e0
    ?setPluginPath@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEBD@Z2890x1800aa720
    ?setPolygonAttributes@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@HMM_N@Z2900x18009df50
    ?setPolygonVertex@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@HHPEBUFMOD_VECTOR@@@Z2910x18009dfb0
    ?setPosition@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@II@Z2920x18009a200
    ?setPosition@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_VECTOR@@@Z2930x18009e000
    ?setPriority@Channel@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z2940x18009a330
    ?setProperties@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_REVERB_PROPERTIES@@@Z2950x18009f370
    ?setReverbProperties@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HM@Z2960x18000d5c0
    ?setReverbProperties@System@FMOD@@QEAA?AW4FMOD_RESULT@@HPEBUFMOD_REVERB_PROPERTIES@@@Z2970x1800aa7f0
    ?setRotation@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_VECTOR@@0@Z2980x18009e030
    ?setScale@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEBUFMOD_VECTOR@@@Z2990x18009e070
    ?setSoftwareChannels@System@FMOD@@QEAA?AW4FMOD_RESULT@@H@Z3000x1800aa920
    ?setSoftwareFormat@System@FMOD@@QEAA?AW4FMOD_RESULT@@HW4FMOD_SPEAKERMODE@@H@Z3010x1800aa9f0
    ?setSoundGroup@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAVSoundGroup@2@@Z3020x1800a30e0
    ?setSpeakerPosition@System@FMOD@@QEAA?AW4FMOD_RESULT@@W4FMOD_SPEAKER@@MM_N@Z3030x1800aab70
    ?setStreamBufferSize@System@FMOD@@QEAA?AW4FMOD_RESULT@@II@Z3040x1800aac70
    ?setUserData@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3050x18000d700
    ?setUserData@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3060x18009d830
    ?setUserData@DSPConnection@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3070x180054670
    ?setUserData@Geometry@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3080x18009e0a0
    ?setUserData@GeometryI@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3090x1800d0d70
    ?setUserData@Reverb3D@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3100x18009f430
    ?setUserData@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3110x1800a3230
    ?setUserData@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3120x1800a4070
    ?setUserData@System@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3130x1800aada0
    ?setUserDataInternal@SoundI@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX@Z3140x1800dd830
    ?setVolume@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z3150x18000d7d0
    ?setVolume@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@M@Z3160x1800a4140
    ?setVolumeRamp@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_N@Z3170x18000d8b0
    ?setWetDryMix@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@MMM@Z3180x18009d8f0
    ?showConfigDialog@DSP@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX_N@Z3190x18009da90
    ?stop@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@XZ3200x18000d990
    ?stop@SoundGroup@FMOD@@QEAA?AW4FMOD_RESULT@@XZ3210x1800a4220
    ?unloadPlugin@System@FMOD@@QEAA?AW4FMOD_RESULT@@I@Z3220x1800aae60
    ?unlock@Sound@FMOD@@QEAA?AW4FMOD_RESULT@@PEAX0II@Z3230x1800a32f0
    ?unlockDSP@System@FMOD@@QEAA?AW4FMOD_RESULT@@XZ3240x1800aaf30
    ?update@System@FMOD@@QEAA?AW4FMOD_RESULT@@XZ3250x1800aafd0
    ?validate@ChannelI@FMOD@@SA?AW4FMOD_RESULT@@PEAVChannel@2@PEAPEAV12@PEAVSystemLockScope@2@@Z3260x1800cd8b0
    ?validate@DSPI@FMOD@@SA?AW4FMOD_RESULT@@PEAVDSP@2@PEAPEAV12@PEAVSystemLockScope@2@@Z3270x1800960c0
    ?validate@SystemI@FMOD@@SA?AW4FMOD_RESULT@@PEAVSystem@2@PEAPEAV12@PEAVSystemLockScope@2@@Z3280x1800e4790
    ?wakeupThread@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@XZ3290x1800c4690
    FMOD5_ChannelGroup_AddDSP3300x1800ee670
    FMOD5_ChannelGroup_AddFadePoint3310x1800ee680
    FMOD5_ChannelGroup_AddGroup3320x1800ee690
    FMOD5_ChannelGroup_Get3DAttributes3330x1800ee6a0
    FMOD5_ChannelGroup_Get3DConeOrientation3340x1800ee6b0
    FMOD5_ChannelGroup_Get3DConeSettings3350x1800ee6c0
    FMOD5_ChannelGroup_Get3DCustomRolloff3360x1800ee6d0
    FMOD5_ChannelGroup_Get3DDistanceFilter3370x1800ee6e0
    FMOD5_ChannelGroup_Get3DDopplerLevel3380x1800ee6f0
    FMOD5_ChannelGroup_Get3DLevel3390x1800ee700
    FMOD5_ChannelGroup_Get3DMinMaxDistance3400x1800ee710
    FMOD5_ChannelGroup_Get3DOcclusion3410x1800ee720
    FMOD5_ChannelGroup_Get3DSpread3420x1800ee730
    FMOD5_ChannelGroup_GetAudibility3430x1800ee740
    FMOD5_ChannelGroup_GetChannel3440x1800ee750
    FMOD5_ChannelGroup_GetDSP3450x1800ee760
    FMOD5_ChannelGroup_GetDSPClock3460x1800ee770
    FMOD5_ChannelGroup_GetDSPIndex3470x1800ee780
    FMOD5_ChannelGroup_GetDelay3480x1800ee790
    FMOD5_ChannelGroup_GetFadePoints3490x1800ee7a0
    FMOD5_ChannelGroup_GetGroup3500x1800ee7b0
    FMOD5_ChannelGroup_GetLowPassGain3510x1800ee7c0
    FMOD5_ChannelGroup_GetMixMatrix3520x1800ee7d0
    FMOD5_ChannelGroup_GetMode3530x1800ee7e0
    FMOD5_ChannelGroup_GetMute3540x1800ee7f0
    FMOD5_ChannelGroup_GetName3550x1800ee800
    FMOD5_ChannelGroup_GetNumChannels3560x1800ee810
    FMOD5_ChannelGroup_GetNumDSPs3570x1800ee820
    FMOD5_ChannelGroup_GetNumGroups3580x1800ee830
    FMOD5_ChannelGroup_GetParentGroup3590x1800ee840
    FMOD5_ChannelGroup_GetPaused3600x1800ee850
    FMOD5_ChannelGroup_GetPitch3610x1800ee860
    FMOD5_ChannelGroup_GetReverbProperties3620x1800ee870
    FMOD5_ChannelGroup_GetSystemObject3630x1800ee880
    FMOD5_ChannelGroup_GetUserData3640x1800ee890
    FMOD5_ChannelGroup_GetVolume3650x1800ee8a0
    FMOD5_ChannelGroup_GetVolumeRamp3660x1800ee8b0
    FMOD5_ChannelGroup_IsPlaying3670x1800ee8c0
    FMOD5_ChannelGroup_Release3680x1800ee8d0
    FMOD5_ChannelGroup_RemoveDSP3690x1800ee8e0
    FMOD5_ChannelGroup_RemoveFadePoints3700x1800ee8f0
    FMOD5_ChannelGroup_Set3DAttributes3710x1800ee900
    FMOD5_ChannelGroup_Set3DConeOrientation3720x1800ee910
    FMOD5_ChannelGroup_Set3DConeSettings3730x1800ee920
    FMOD5_ChannelGroup_Set3DCustomRolloff3740x1800ee930
    FMOD5_ChannelGroup_Set3DDistanceFilter3750x1800ee940
    FMOD5_ChannelGroup_Set3DDopplerLevel3760x1800ee950
    FMOD5_ChannelGroup_Set3DLevel3770x1800ee960
    FMOD5_ChannelGroup_Set3DMinMaxDistance3780x1800ee970
    FMOD5_ChannelGroup_Set3DOcclusion3790x1800ee980
    FMOD5_ChannelGroup_Set3DSpread3800x1800ee990
    FMOD5_ChannelGroup_SetCallback3810x1800ee9a0
    FMOD5_ChannelGroup_SetDSPIndex3820x1800ee9b0
    FMOD5_ChannelGroup_SetDelay3830x1800ee9c0
    FMOD5_ChannelGroup_SetFadePointRamp3840x1800ee9d0
    FMOD5_ChannelGroup_SetLowPassGain3850x1800ee9e0
    FMOD5_ChannelGroup_SetMixLevelsInput3860x1800ee9f0
    FMOD5_ChannelGroup_SetMixLevelsOutput3870x1800eea00
    FMOD5_ChannelGroup_SetMixMatrix3880x1800eea10
    FMOD5_ChannelGroup_SetMode3890x1800eea20
    FMOD5_ChannelGroup_SetMute3900x1800eea30
    FMOD5_ChannelGroup_SetPan3910x1800eea40
    FMOD5_ChannelGroup_SetPaused3920x1800eea50
    FMOD5_ChannelGroup_SetPitch3930x1800eea60
    FMOD5_ChannelGroup_SetReverbProperties3940x1800eea70
    FMOD5_ChannelGroup_SetUserData3950x1800eea80
    FMOD5_ChannelGroup_SetVolume3960x1800eea90
    FMOD5_ChannelGroup_SetVolumeRamp3970x1800eeaa0
    FMOD5_ChannelGroup_Stop3980x1800eeab0
    FMOD5_Channel_AddDSP3990x1800eeac0
    FMOD5_Channel_AddFadePoint4000x1800eead0
    FMOD5_Channel_Get3DAttributes4010x1800eeae0
    FMOD5_Channel_Get3DConeOrientation4020x1800eeaf0
    FMOD5_Channel_Get3DConeSettings4030x1800eeb00
    FMOD5_Channel_Get3DCustomRolloff4040x1800eeb10
    FMOD5_Channel_Get3DDistanceFilter4050x1800eeb20
    FMOD5_Channel_Get3DDopplerLevel4060x1800eeb30
    FMOD5_Channel_Get3DLevel4070x1800eeb40
    FMOD5_Channel_Get3DMinMaxDistance4080x1800eeb50
    FMOD5_Channel_Get3DOcclusion4090x1800eeb60
    FMOD5_Channel_Get3DSpread4100x1800eeb70
    FMOD5_Channel_GetAudibility4110x1800eeb80
    FMOD5_Channel_GetChannelGroup4120x1800eeb90
    FMOD5_Channel_GetCurrentSound4130x1800eeba0
    FMOD5_Channel_GetDSP4140x1800eebb0
    FMOD5_Channel_GetDSPClock4150x1800eebc0
    FMOD5_Channel_GetDSPIndex4160x1800eebd0
    FMOD5_Channel_GetDelay4170x1800eebe0
    FMOD5_Channel_GetFadePoints4180x1800eebf0
    FMOD5_Channel_GetFrequency4190x1800eec00
    FMOD5_Channel_GetIndex4200x1800eec10
    FMOD5_Channel_GetLoopCount4210x1800eec20
    FMOD5_Channel_GetLoopPoints4220x1800eec30
    FMOD5_Channel_GetLowPassGain4230x1800eec40
    FMOD5_Channel_GetMixMatrix4240x1800eec50
    FMOD5_Channel_GetMode4250x1800eec60
    FMOD5_Channel_GetMute4260x1800eec70
    FMOD5_Channel_GetNumDSPs4270x1800eec80
    FMOD5_Channel_GetPaused4280x1800eec90
    FMOD5_Channel_GetPitch4290x1800eeca0
    FMOD5_Channel_GetPosition4300x1800eecb0
    FMOD5_Channel_GetPriority4310x1800eecc0
    FMOD5_Channel_GetReverbProperties4320x1800eecd0
    FMOD5_Channel_GetSystemObject4330x1800eece0
    FMOD5_Channel_GetUserData4340x1800eecf0
    FMOD5_Channel_GetVolume4350x1800eed00
    FMOD5_Channel_GetVolumeRamp4360x1800eed10
    FMOD5_Channel_IsPlaying4370x1800eed20
    FMOD5_Channel_IsVirtual4380x1800eed30
    FMOD5_Channel_RemoveDSP4390x1800eed40
    FMOD5_Channel_RemoveFadePoints4400x1800eed50
    FMOD5_Channel_Set3DAttributes4410x1800eed60
    FMOD5_Channel_Set3DConeOrientation4420x1800eed70
    FMOD5_Channel_Set3DConeSettings4430x1800eed80
    FMOD5_Channel_Set3DCustomRolloff4440x1800eed90
    FMOD5_Channel_Set3DDistanceFilter4450x1800eeda0
    FMOD5_Channel_Set3DDopplerLevel4460x1800eedb0
    FMOD5_Channel_Set3DLevel4470x1800eedc0
    FMOD5_Channel_Set3DMinMaxDistance4480x1800eedd0
    FMOD5_Channel_Set3DOcclusion4490x1800eede0
    FMOD5_Channel_Set3DSpread4500x1800eedf0
    FMOD5_Channel_SetCallback4510x1800eee00
    FMOD5_Channel_SetChannelGroup4520x1800eee10
    FMOD5_Channel_SetDSPIndex4530x1800eee20
    FMOD5_Channel_SetDelay4540x1800eee30
    FMOD5_Channel_SetFadePointRamp4550x1800eee40
    FMOD5_Channel_SetFrequency4560x1800eee50
    FMOD5_Channel_SetLoopCount4570x1800eee60
    FMOD5_Channel_SetLoopPoints4580x1800eee70
    FMOD5_Channel_SetLowPassGain4590x1800eee80
    FMOD5_Channel_SetMixLevelsInput4600x1800eee90
    FMOD5_Channel_SetMixLevelsOutput4610x1800eeea0
    FMOD5_Channel_SetMixMatrix4620x1800eeeb0
    FMOD5_Channel_SetMode4630x1800eeec0
    FMOD5_Channel_SetMute4640x1800eeed0
    FMOD5_Channel_SetPan4650x1800eeee0
    FMOD5_Channel_SetPaused4660x1800eeef0
    FMOD5_Channel_SetPitch4670x1800eef00
    FMOD5_Channel_SetPosition4680x1800eef10
    FMOD5_Channel_SetPriority4690x1800eef20
    FMOD5_Channel_SetReverbProperties4700x1800eef30
    FMOD5_Channel_SetUserData4710x1800eef40
    FMOD5_Channel_SetVolume4720x1800eef50
    FMOD5_Channel_SetVolumeRamp4730x1800eef60
    FMOD5_Channel_Stop4740x1800eef70
    FMOD5_DSPConnection_GetInput4750x1800eef80
    FMOD5_DSPConnection_GetMix4760x1800eef90
    FMOD5_DSPConnection_GetMixMatrix4770x1800eefa0
    FMOD5_DSPConnection_GetOutput4780x1800eefb0
    FMOD5_DSPConnection_GetType4790x1800eefc0
    FMOD5_DSPConnection_GetUserData4800x1800eefd0
    FMOD5_DSPConnection_SetMix4810x1800eefe0
    FMOD5_DSPConnection_SetMixMatrix4820x1800eeff0
    FMOD5_DSPConnection_SetUserData4830x1800ef000
    FMOD5_DSP_AddInput4840x1800ef010
    FMOD5_DSP_DisconnectAll4850x1800ef020
    FMOD5_DSP_DisconnectFrom4860x1800ef030
    FMOD5_DSP_GetActive4870x1800ef040
    FMOD5_DSP_GetBypass4880x1800ef050
    FMOD5_DSP_GetCPUUsage4890x1800ef060
    FMOD5_DSP_GetChannelFormat4900x1800ef070
    FMOD5_DSP_GetDataParameterIndex4910x1800ef080
    FMOD5_DSP_GetIdle4920x1800ef090
    FMOD5_DSP_GetInfo4930x1800ef0a0
    FMOD5_DSP_GetInput4940x1800ef0b0
    FMOD5_DSP_GetMeteringEnabled4950x1800ef0c0
    FMOD5_DSP_GetMeteringInfo4960x1800ef0d0
    FMOD5_DSP_GetNumInputs4970x1800ef0e0
    FMOD5_DSP_GetNumOutputs4980x1800ef0f0
    FMOD5_DSP_GetNumParameters4990x1800ef100
    FMOD5_DSP_GetOutput5000x1800ef110
    FMOD5_DSP_GetOutputChannelFormat5010x1800ef120
    FMOD5_DSP_GetParameterBool5020x1800ef130
    FMOD5_DSP_GetParameterData5030x1800ef140
    FMOD5_DSP_GetParameterFloat5040x1800ef150
    FMOD5_DSP_GetParameterInfo5050x1800ef160
    FMOD5_DSP_GetParameterInt5060x1800ef170
    FMOD5_DSP_GetSystemObject5070x1800ef180
    FMOD5_DSP_GetType5080x1800ef190
    FMOD5_DSP_GetUserData5090x1800ef1a0
    FMOD5_DSP_GetWetDryMix5100x1800ef1b0
    FMOD5_DSP_Release5110x1800ef1c0
    FMOD5_DSP_Reset5120x1800ef1d0
    FMOD5_DSP_SetActive5130x1800ef1e0
    FMOD5_DSP_SetBypass5140x1800ef1f0
    FMOD5_DSP_SetChannelFormat5150x1800ef200
    FMOD5_DSP_SetMeteringEnabled5160x1800ef210
    FMOD5_DSP_SetParameterBool5170x1800ef220
    FMOD5_DSP_SetParameterData5180x1800ef230
    FMOD5_DSP_SetParameterFloat5190x1800ef240
    FMOD5_DSP_SetParameterInt5200x1800ef250
    FMOD5_DSP_SetUserData5210x1800ef260
    FMOD5_DSP_SetWetDryMix5220x1800ef270
    FMOD5_DSP_ShowConfigDialog5230x1800ef280
    FMOD5_Debug_Initialize5240x1800ef290
    FMOD5_File_GetDiskBusy5250x1800ef2a0
    FMOD5_File_SetDiskBusy5260x1800ef2b0
    FMOD5_Geometry_AddPolygon5270x1800ef2c0
    FMOD5_Geometry_GetActive5280x1800ef2d0
    FMOD5_Geometry_GetMaxPolygons5290x1800ef2e0
    FMOD5_Geometry_GetNumPolygons5300x1800ef2f0
    FMOD5_Geometry_GetPolygonAttributes5310x1800ef300
    FMOD5_Geometry_GetPolygonNumVertices5320x1800ef310
    FMOD5_Geometry_GetPolygonVertex5330x1800ef320
    FMOD5_Geometry_GetPosition5340x1800ef330
    FMOD5_Geometry_GetRotation5350x1800ef340
    FMOD5_Geometry_GetScale5360x1800ef350
    FMOD5_Geometry_GetUserData5370x1800ef360
    FMOD5_Geometry_Release5380x1800ef370
    FMOD5_Geometry_Save5390x1800ef380
    FMOD5_Geometry_SetActive5400x1800ef390
    FMOD5_Geometry_SetPolygonAttributes5410x1800ef3a0
    FMOD5_Geometry_SetPolygonVertex5420x1800ef3b0
    FMOD5_Geometry_SetPosition5430x1800ef3c0
    FMOD5_Geometry_SetRotation5440x1800ef3d0
    FMOD5_Geometry_SetScale5450x1800ef3e0
    FMOD5_Geometry_SetUserData5460x1800ef3f0
    FMOD5_Memory_GetStats5470x1800ef400
    FMOD5_Memory_Initialize5480x1800ef410
    FMOD5_Reverb3D_Get3DAttributes5490x1800ef420
    FMOD5_Reverb3D_GetActive5500x1800ef430
    FMOD5_Reverb3D_GetProperties5510x1800ef440
    FMOD5_Reverb3D_GetUserData5520x1800ef450
    FMOD5_Reverb3D_Release5530x1800ef460
    FMOD5_Reverb3D_Set3DAttributes5540x1800ef470
    FMOD5_Reverb3D_SetActive5550x1800ef480
    FMOD5_Reverb3D_SetProperties5560x1800ef490
    FMOD5_Reverb3D_SetUserData5570x1800ef4a0
    FMOD5_SoundGroup_GetMaxAudible5580x1800ef4b0
    FMOD5_SoundGroup_GetMaxAudibleBehavior5590x1800ef4c0
    FMOD5_SoundGroup_GetMuteFadeSpeed5600x1800ef4d0
    FMOD5_SoundGroup_GetName5610x1800ef4e0
    FMOD5_SoundGroup_GetNumPlaying5620x1800ef4f0
    FMOD5_SoundGroup_GetNumSounds5630x1800ef500
    FMOD5_SoundGroup_GetSound5640x1800ef510
    FMOD5_SoundGroup_GetSystemObject5650x1800ef520
    FMOD5_SoundGroup_GetUserData5660x1800ef530
    FMOD5_SoundGroup_GetVolume5670x1800ef540
    FMOD5_SoundGroup_Release5680x1800ef550
    FMOD5_SoundGroup_SetMaxAudible5690x1800ef560
    FMOD5_SoundGroup_SetMaxAudibleBehavior5700x1800ef570
    FMOD5_SoundGroup_SetMuteFadeSpeed5710x1800ef580
    FMOD5_SoundGroup_SetUserData5720x1800ef590
    FMOD5_SoundGroup_SetVolume5730x1800ef5a0
    FMOD5_SoundGroup_Stop5740x1800ef5b0
    FMOD5_Sound_AddSyncPoint5750x1800ef5c0
    FMOD5_Sound_DeleteSyncPoint5760x1800ef5d0
    FMOD5_Sound_Get3DConeSettings5770x1800ef5e0
    FMOD5_Sound_Get3DCustomRolloff5780x1800ef5f0
    FMOD5_Sound_Get3DMinMaxDistance5790x1800ef600
    FMOD5_Sound_GetDefaults5800x1800ef610
    FMOD5_Sound_GetFormat5810x1800ef620
    FMOD5_Sound_GetLength5820x1800ef630
    FMOD5_Sound_GetLoopCount5830x1800ef640
    FMOD5_Sound_GetLoopPoints5840x1800ef650
    FMOD5_Sound_GetMode5850x1800ef660
    FMOD5_Sound_GetMusicChannelVolume5860x1800ef670
    FMOD5_Sound_GetMusicNumChannels5870x1800ef680
    FMOD5_Sound_GetMusicSpeed5880x1800ef690
    FMOD5_Sound_GetName5890x1800ef6a0
    FMOD5_Sound_GetNumSubSounds5900x1800ef6b0
    FMOD5_Sound_GetNumSyncPoints5910x1800ef6c0
    FMOD5_Sound_GetNumTags5920x1800ef6d0
    FMOD5_Sound_GetOpenState5930x1800ef6e0
    FMOD5_Sound_GetSoundGroup5940x1800ef6f0
    FMOD5_Sound_GetSubSound5950x1800ef700
    FMOD5_Sound_GetSubSoundParent5960x1800ef710
    FMOD5_Sound_GetSyncPoint5970x1800ef720
    FMOD5_Sound_GetSyncPointInfo5980x1800ef730
    FMOD5_Sound_GetSystemObject5990x1800ef740
    FMOD5_Sound_GetTag6000x1800ef750
    FMOD5_Sound_GetUserData6010x1800ef760
    FMOD5_Sound_Lock6020x1800ef770
    FMOD5_Sound_ReadData6030x1800ef780
    FMOD5_Sound_Release6040x1800ef790
    FMOD5_Sound_SeekData6050x1800ef7a0
    FMOD5_Sound_Set3DConeSettings6060x1800ef7b0
    FMOD5_Sound_Set3DCustomRolloff6070x1800ef7c0
    FMOD5_Sound_Set3DMinMaxDistance6080x1800ef7d0
    FMOD5_Sound_SetDefaults6090x1800ef7e0
    FMOD5_Sound_SetLoopCount6100x1800ef7f0
    FMOD5_Sound_SetLoopPoints6110x1800ef800
    FMOD5_Sound_SetMode6120x1800ef810
    FMOD5_Sound_SetMusicChannelVolume6130x1800ef820
    FMOD5_Sound_SetMusicSpeed6140x1800ef830
    FMOD5_Sound_SetSoundGroup6150x1800ef840
    FMOD5_Sound_SetUserData6160x1800ef850
    FMOD5_Sound_Unlock6170x1800ef860
    FMOD5_System_AttachChannelGroupToPort6180x1800ef870
    FMOD5_System_AttachFileSystem6190x1800ef880
    FMOD5_System_Close6200x1800ef890
    FMOD5_System_Create6210x1800ef8a0
    FMOD5_System_CreateChannelGroup6220x1800ef8b0
    FMOD5_System_CreateDSP6230x1800ef8c0
    FMOD5_System_CreateDSPByPlugin6240x1800ef8d0
    FMOD5_System_CreateDSPByType6250x1800ef8e0
    FMOD5_System_CreateGeometry6260x1800ef8f0
    FMOD5_System_CreateReverb3D6270x1800ef900
    FMOD5_System_CreateSound6280x1800ef910
    FMOD5_System_CreateSoundGroup6290x1800ef920
    FMOD5_System_CreateStream6300x1800ef930
    FMOD5_System_DetachChannelGroupFromPort6310x1800ef940
    FMOD5_System_Get3DListenerAttributes6320x1800ef950
    FMOD5_System_Get3DNumListeners6330x1800ef960
    FMOD5_System_Get3DSettings6340x1800ef970
    FMOD5_System_GetAdvancedSettings6350x1800ef980
    FMOD5_System_GetCPUUsage6360x1800ef990
    FMOD5_System_GetChannel6370x1800ef9a0
    FMOD5_System_GetChannelsPlaying6380x1800ef9b0
    FMOD5_System_GetDSPBufferSize6390x1800ef9c0
    FMOD5_System_GetDSPInfoByPlugin6400x1800ef9d0
    FMOD5_System_GetDefaultMixMatrix6410x1800ef9e0
    FMOD5_System_GetDriver6420x1800ef9f0
    FMOD5_System_GetDriverInfo6430x1800efa00
    FMOD5_System_GetFileUsage6440x1800efa10
    FMOD5_System_GetGeometryOcclusion6450x1800efa20
    FMOD5_System_GetGeometrySettings6460x1800efa30
    FMOD5_System_GetMasterChannelGroup6470x1800efa40
    FMOD5_System_GetMasterSoundGroup6480x1800efa50
    FMOD5_System_GetNestedPlugin6490x1800efa60
    FMOD5_System_GetNetworkProxy6500x1800efa70
    FMOD5_System_GetNetworkTimeout6510x1800efa80
    FMOD5_System_GetNumDrivers6520x1800efa90
    FMOD5_System_GetNumNestedPlugins6530x1800efaa0
    FMOD5_System_GetNumPlugins6540x1800efab0
    FMOD5_System_GetOutput6550x1800efac0
    FMOD5_System_GetOutputByPlugin6560x1800efad0
    FMOD5_System_GetOutputHandle6570x1800efae0
    FMOD5_System_GetPluginHandle6580x1800efaf0
    FMOD5_System_GetPluginInfo6590x1800efb00
    FMOD5_System_GetRecordDriverInfo6600x1800efb10
    FMOD5_System_GetRecordNumDrivers6610x1800efb20
    FMOD5_System_GetRecordPosition6620x1800efb30
    FMOD5_System_GetReverbProperties6630x1800efb40
    FMOD5_System_GetSoftwareChannels6640x1800efb50
    FMOD5_System_GetSoftwareFormat6650x1800efb60
    FMOD5_System_GetSoundRAM6660x1800efb70
    FMOD5_System_GetSpeakerModeChannels6670x1800efb80
    FMOD5_System_GetSpeakerPosition6680x1800efb90
    FMOD5_System_GetStreamBufferSize6690x1800efba0
    FMOD5_System_GetUserData6700x1800efbb0
    FMOD5_System_GetVersion6710x1800efbc0
    FMOD5_System_Init6720x1800efbd0
    FMOD5_System_IsRecording6730x1800efbe0
    FMOD5_System_LoadGeometry6740x1800efbf0
    FMOD5_System_LoadPlugin6750x1800efc00
    FMOD5_System_LockDSP6760x1800efc10
    FMOD5_System_MixerResume6770x1800efc20
    FMOD5_System_MixerSuspend6780x1800efc30
    FMOD5_System_PlayDSP6790x1800efc40
    FMOD5_System_PlaySound6800x1800efc50
    FMOD5_System_RecordStart6810x1800efc60
    FMOD5_System_RecordStop6820x1800efc70
    FMOD5_System_RegisterCodec6830x1800efc80
    FMOD5_System_RegisterDSP6840x1800efc90
    FMOD5_System_RegisterOutput6850x1800efca0
    FMOD5_System_Release6860x1800efcb0
    FMOD5_System_Set3DListenerAttributes6870x1800efcc0
    FMOD5_System_Set3DNumListeners6880x1800efcd0
    FMOD5_System_Set3DRolloffCallback6890x1800efce0
    FMOD5_System_Set3DSettings6900x1800efcf0
    FMOD5_System_SetAdvancedSettings6910x1800efd00
    FMOD5_System_SetCallback6920x1800efd10
    FMOD5_System_SetDSPBufferSize6930x1800efd20
    FMOD5_System_SetDriver6940x1800efd30
    FMOD5_System_SetFileSystem6950x1800efd40
    FMOD5_System_SetGeometrySettings6960x1800efd50
    FMOD5_System_SetNetworkProxy6970x1800efd60
    FMOD5_System_SetNetworkTimeout6980x1800efd70
    FMOD5_System_SetOutput6990x1800efd80
    FMOD5_System_SetOutputByPlugin7000x1800efd90
    FMOD5_System_SetPluginPath7010x1800efda0
    FMOD5_System_SetReverbProperties7020x1800efdb0
    FMOD5_System_SetSoftwareChannels7030x1800efdc0
    FMOD5_System_SetSoftwareFormat7040x1800efdd0
    FMOD5_System_SetSpeakerPosition7050x1800efde0
    FMOD5_System_SetStreamBufferSize7060x1800efdf0
    FMOD5_System_SetUserData7070x1800efe00
    FMOD5_System_UnloadPlugin7080x1800efe10
    FMOD5_System_UnlockDSP7090x1800efe20
    FMOD5_System_Update7100x1800efe30
    FMOD_ChannelGroup_AddDSP7110x1800c1a10
    FMOD_ChannelGroup_AddFadePoint7120x1800c1a20
    FMOD_ChannelGroup_AddGroup7130x1800c1a30
    FMOD_ChannelGroup_Get3DAttributes7140x1800c1a50
    FMOD_ChannelGroup_Get3DConeOrientation7150x1800c1a60
    FMOD_ChannelGroup_Get3DConeSettings7160x1800c1a70
    FMOD_ChannelGroup_Get3DCustomRolloff7170x1800c1a80
    FMOD_ChannelGroup_Get3DDistanceFilter7180x1800c1a90
    FMOD_ChannelGroup_Get3DDopplerLevel7190x1800c1ad0
    FMOD_ChannelGroup_Get3DLevel7200x1800c1ae0
    FMOD_ChannelGroup_Get3DMinMaxDistance7210x1800c1af0
    FMOD_ChannelGroup_Get3DOcclusion7220x1800c1b00
    FMOD_ChannelGroup_Get3DSpread7230x1800c1b10
    FMOD_ChannelGroup_GetAudibility7240x1800c1b20
    FMOD_ChannelGroup_GetChannel7250x1800c1b30
    FMOD_ChannelGroup_GetDSP7260x1800c1b40
    FMOD_ChannelGroup_GetDSPClock7270x1800c1b50
    FMOD_ChannelGroup_GetDSPIndex7280x1800c1b60
    FMOD_ChannelGroup_GetDelay7290x1800c1b70
    FMOD_ChannelGroup_GetFadePoints7300x1800c1bb0
    FMOD_ChannelGroup_GetGroup7310x1800c1bc0
    FMOD_ChannelGroup_GetLowPassGain7320x1800c1bd0
    FMOD_ChannelGroup_GetMixMatrix7330x1800c1be0
    FMOD_ChannelGroup_GetMode7340x1800c1bf0
    FMOD_ChannelGroup_GetMute7350x1800c1c00
    FMOD_ChannelGroup_GetName7360x1800c1c40
    FMOD_ChannelGroup_GetNumChannels7370x1800c1c50
    FMOD_ChannelGroup_GetNumDSPs7380x1800c1c60
    FMOD_ChannelGroup_GetNumGroups7390x1800c1c70
    FMOD_ChannelGroup_GetParentGroup7400x1800c1c80
    FMOD_ChannelGroup_GetPaused7410x1800c1c90
    FMOD_ChannelGroup_GetPitch7420x1800c1cd0
    FMOD_ChannelGroup_GetReverbProperties7430x1800c1ce0
    FMOD_ChannelGroup_GetSystemObject7440x1800c1cf0
    FMOD_ChannelGroup_GetUserData7450x1800c1d00
    FMOD_ChannelGroup_GetVolume7460x1800c1d10
    FMOD_ChannelGroup_GetVolumeRamp7470x1800c1d20
    FMOD_ChannelGroup_IsPlaying7480x1800c1d60
    FMOD_ChannelGroup_Release7490x1800c1da0
    FMOD_ChannelGroup_RemoveDSP7500x1800c1db0
    FMOD_ChannelGroup_RemoveFadePoints7510x1800c1dc0
    FMOD_ChannelGroup_Set3DAttributes7520x1800c1dd0
    FMOD_ChannelGroup_Set3DConeOrientation7530x1800c1de0
    FMOD_ChannelGroup_Set3DConeSettings7540x1800c1df0
    FMOD_ChannelGroup_Set3DCustomRolloff7550x1800c1e00
    FMOD_ChannelGroup_Set3DDistanceFilter7560x1800c1e10
    FMOD_ChannelGroup_Set3DDopplerLevel7570x1800c1e30
    FMOD_ChannelGroup_Set3DLevel7580x1800c1e40
    FMOD_ChannelGroup_Set3DMinMaxDistance7590x1800c1e50
    FMOD_ChannelGroup_Set3DOcclusion7600x1800c1e60
    FMOD_ChannelGroup_Set3DSpread7610x1800c1e70
    FMOD_ChannelGroup_SetCallback7620x1800c1e80
    FMOD_ChannelGroup_SetDSPIndex7630x1800c1e90
    FMOD_ChannelGroup_SetDelay7640x1800c1ea0
    FMOD_ChannelGroup_SetFadePointRamp7650x1800c1ec0
    FMOD_ChannelGroup_SetLowPassGain7660x1800c1ed0
    FMOD_ChannelGroup_SetMixLevelsInput7670x1800c1ee0
    FMOD_ChannelGroup_SetMixLevelsOutput7680x1800c1ef0
    FMOD_ChannelGroup_SetMixMatrix7690x1800c1f10
    FMOD_ChannelGroup_SetMode7700x1800c1f20
    FMOD_ChannelGroup_SetMute7710x1800c1f30
    FMOD_ChannelGroup_SetPan7720x1800c1f50
    FMOD_ChannelGroup_SetPaused7730x1800c1f60
    FMOD_ChannelGroup_SetPitch7740x1800c1f80
    FMOD_ChannelGroup_SetReverbProperties7750x1800c1f90
    FMOD_ChannelGroup_SetUserData7760x1800c1fa0
    FMOD_ChannelGroup_SetVolume7770x1800c1fb0
    FMOD_ChannelGroup_SetVolumeRamp7780x1800c1fc0
    FMOD_ChannelGroup_Stop7790x1800c1fe0
    FMOD_Channel_AddDSP7800x1800c1ff0
    FMOD_Channel_AddFadePoint7810x1800c2000
    FMOD_Channel_Get3DAttributes7820x1800c2010
    FMOD_Channel_Get3DConeOrientation7830x1800c2020
    FMOD_Channel_Get3DConeSettings7840x1800c2030
    FMOD_Channel_Get3DCustomRolloff7850x1800c2040
    FMOD_Channel_Get3DDistanceFilter7860x1800c2050
    FMOD_Channel_Get3DDopplerLevel7870x1800c2090
    FMOD_Channel_Get3DLevel7880x1800c20a0
    FMOD_Channel_Get3DMinMaxDistance7890x1800c20b0
    FMOD_Channel_Get3DOcclusion7900x1800c20c0
    FMOD_Channel_Get3DSpread7910x1800c20d0
    FMOD_Channel_GetAudibility7920x1800c20e0
    FMOD_Channel_GetChannelGroup7930x1800c20f0
    FMOD_Channel_GetCurrentSound7940x1800c2100
    FMOD_Channel_GetDSP7950x1800c2110
    FMOD_Channel_GetDSPClock7960x1800c2120
    FMOD_Channel_GetDSPIndex7970x1800c2130
    FMOD_Channel_GetDelay7980x1800c2140
    FMOD_Channel_GetFadePoints7990x1800c2180
    FMOD_Channel_GetFrequency8000x1800c2190
    FMOD_Channel_GetIndex8010x1800c21a0
    FMOD_Channel_GetLoopCount8020x1800c21b0
    FMOD_Channel_GetLoopPoints8030x1800c21c0
    FMOD_Channel_GetLowPassGain8040x1800c21d0
    FMOD_Channel_GetMixMatrix8050x1800c21e0
    FMOD_Channel_GetMode8060x1800c21f0
    FMOD_Channel_GetMute8070x1800c2200
    FMOD_Channel_GetNumDSPs8080x1800c2240
    FMOD_Channel_GetPaused8090x1800c2250
    FMOD_Channel_GetPitch8100x1800c2290
    FMOD_Channel_GetPosition8110x1800c22a0
    FMOD_Channel_GetPriority8120x1800c22b0
    FMOD_Channel_GetReverbProperties8130x1800c22c0
    FMOD_Channel_GetSystemObject8140x1800c22d0
    FMOD_Channel_GetUserData8150x1800c22e0
    FMOD_Channel_GetVolume8160x1800c22f0
    FMOD_Channel_GetVolumeRamp8170x1800c2300
    FMOD_Channel_IsPlaying8180x1800c2340
    FMOD_Channel_IsVirtual8190x1800c2380
    FMOD_Channel_RemoveDSP8200x1800c23c0
    FMOD_Channel_RemoveFadePoints8210x1800c23d0
    FMOD_Channel_Set3DAttributes8220x1800c23e0
    FMOD_Channel_Set3DConeOrientation8230x1800c23f0
    FMOD_Channel_Set3DConeSettings8240x1800c2400
    FMOD_Channel_Set3DCustomRolloff8250x1800c2410
    FMOD_Channel_Set3DDistanceFilter8260x1800c2420
    FMOD_Channel_Set3DDopplerLevel8270x1800c2440
    FMOD_Channel_Set3DLevel8280x1800c2450
    FMOD_Channel_Set3DMinMaxDistance8290x1800c2460
    FMOD_Channel_Set3DOcclusion8300x1800c2470
    FMOD_Channel_Set3DSpread8310x1800c2480
    FMOD_Channel_SetCallback8320x1800c2490
    FMOD_Channel_SetChannelGroup8330x1800c24a0
    FMOD_Channel_SetDSPIndex8340x1800c24b0
    FMOD_Channel_SetDelay8350x1800c24c0
    FMOD_Channel_SetFadePointRamp8360x1800c24e0
    FMOD_Channel_SetFrequency8370x1800c24f0
    FMOD_Channel_SetLoopCount8380x1800c2500
    FMOD_Channel_SetLoopPoints8390x1800c2510
    FMOD_Channel_SetLowPassGain8400x1800c2520
    FMOD_Channel_SetMixLevelsInput8410x1800c2530
    FMOD_Channel_SetMixLevelsOutput8420x1800c2540
    FMOD_Channel_SetMixMatrix8430x1800c2560
    FMOD_Channel_SetMode8440x1800c2570
    FMOD_Channel_SetMute8450x1800c2580
    FMOD_Channel_SetPan8460x1800c25a0
    FMOD_Channel_SetPaused8470x1800c25b0
    FMOD_Channel_SetPitch8480x1800c25d0
    FMOD_Channel_SetPosition8490x1800c25e0
    FMOD_Channel_SetPriority8500x1800c25f0
    FMOD_Channel_SetReverbProperties8510x1800c2600
    FMOD_Channel_SetUserData8520x1800c2610
    FMOD_Channel_SetVolume8530x1800c2620
    FMOD_Channel_SetVolumeRamp8540x1800c2630
    FMOD_Channel_Stop8550x1800c2650
    FMOD_DSPConnection_GetInput8560x1800c2660
    FMOD_DSPConnection_GetMix8570x1800c2670
    FMOD_DSPConnection_GetMixMatrix8580x1800c2680
    FMOD_DSPConnection_GetOutput8590x1800c2690
    FMOD_DSPConnection_GetType8600x1800c26a0
    FMOD_DSPConnection_GetUserData8610x1800c26b0
    FMOD_DSPConnection_SetMix8620x1800c26c0
    FMOD_DSPConnection_SetMixMatrix8630x1800c26d0
    FMOD_DSPConnection_SetUserData8640x1800c26e0
    FMOD_DSP_AddInput8650x1800c26f0
    FMOD_DSP_DisconnectAll8660x1800c2700
    FMOD_DSP_DisconnectFrom8670x1800c2720
    FMOD_DSP_GetActive8680x1800c2730
    FMOD_DSP_GetBypass8690x1800c2770
    FMOD_DSP_GetCPUUsage8700x1800c27b0
    FMOD_DSP_GetChannelFormat8710x1800c27c0
    FMOD_DSP_GetDataParameterIndex8720x1800c27d0
    FMOD_DSP_GetIdle8730x1800c27e0
    FMOD_DSP_GetInfo8740x1800c2820
    FMOD_DSP_GetInput8750x1800c2830
    FMOD_DSP_GetMeteringEnabled8760x1800c2840
    FMOD_DSP_GetMeteringInfo8770x1800c28b0
    FMOD_DSP_GetNumInputs8780x1800c28c0
    FMOD_DSP_GetNumOutputs8790x1800c28d0
    FMOD_DSP_GetNumParameters8800x1800c28e0
    FMOD_DSP_GetOutput8810x1800c28f0
    FMOD_DSP_GetOutputChannelFormat8820x1800c2900
    FMOD_DSP_GetParameterBool8830x1800c2910
    FMOD_DSP_GetParameterData8840x1800c2960
    FMOD_DSP_GetParameterFloat8850x1800c2970
    FMOD_DSP_GetParameterInfo8860x1800c2980
    FMOD_DSP_GetParameterInt8870x1800c2990
    FMOD_DSP_GetSystemObject8880x1800c29a0
    FMOD_DSP_GetType8890x1800c29b0
    FMOD_DSP_GetUserData8900x1800c29c0
    FMOD_DSP_GetWetDryMix8910x1800c29d0
    FMOD_DSP_Release8920x1800c29e0
    FMOD_DSP_Reset8930x1800c29f0
    FMOD_DSP_SetActive8940x1800c2a00
    FMOD_DSP_SetBypass8950x1800c2a20
    FMOD_DSP_SetChannelFormat8960x1800c2a40
    FMOD_DSP_SetMeteringEnabled8970x1800c2a50
    FMOD_DSP_SetParameterBool8980x1800c2a70
    FMOD_DSP_SetParameterData8990x1800c2a90
    FMOD_DSP_SetParameterFloat9000x1800c2aa0
    FMOD_DSP_SetParameterInt9010x1800c2ab0
    FMOD_DSP_SetUserData9020x1800c2ac0
    FMOD_DSP_SetWetDryMix9030x1800c2ad0
    FMOD_DSP_ShowConfigDialog9040x1800c2ae0
    FMOD_Debug_Initialize9050x1800ab110
    FMOD_File_GetDiskBusy9060x1800ad100
    FMOD_File_SetDiskBusy9070x1800ad120
    FMOD_Geometry_AddPolygon9080x1800c2b00
    FMOD_Geometry_GetActive9090x1800c2b20
    FMOD_Geometry_GetMaxPolygons9100x1800c2b60
    FMOD_Geometry_GetNumPolygons9110x1800c2b70
    FMOD_Geometry_GetPolygonAttributes9120x1800c2b80
    FMOD_Geometry_GetPolygonNumVertices9130x1800c2bc0
    FMOD_Geometry_GetPolygonVertex9140x1800c2bd0
    FMOD_Geometry_GetPosition9150x1800c2be0
    FMOD_Geometry_GetRotation9160x1800c2bf0
    FMOD_Geometry_GetScale9170x1800c2c00
    FMOD_Geometry_GetUserData9180x1800c2c10
    FMOD_Geometry_Release9190x1800c2c20
    FMOD_Geometry_Save9200x1800c2c30
    FMOD_Geometry_SetActive9210x1800c2c40
    FMOD_Geometry_SetPolygonAttributes9220x1800c2c60
    FMOD_Geometry_SetPolygonVertex9230x1800c2c80
    FMOD_Geometry_SetPosition9240x1800c2c90
    FMOD_Geometry_SetRotation9250x1800c2ca0
    FMOD_Geometry_SetScale9260x1800c2cb0
    FMOD_Geometry_SetUserData9270x1800c2cc0
    FMOD_Memory_GetStats9280x1800c2cd0
    FMOD_Memory_Initialize9290x1800c2dd0
    FMOD_Reverb3D_Get3DAttributes9300x1800c2f60
    FMOD_Reverb3D_GetActive9310x1800c2f70
    FMOD_Reverb3D_GetProperties9320x1800c2fb0
    FMOD_Reverb3D_GetUserData9330x1800c2fc0
    FMOD_Reverb3D_Release9340x1800c2fd0
    FMOD_Reverb3D_Set3DAttributes9350x1800c2fe0
    FMOD_Reverb3D_SetActive9360x1800c2ff0
    FMOD_Reverb3D_SetProperties9370x1800c3010
    FMOD_Reverb3D_SetUserData9380x1800c3020
    FMOD_SoundGroup_GetMaxAudible9390x1800c3030
    FMOD_SoundGroup_GetMaxAudibleBehavior9400x1800c3040
    FMOD_SoundGroup_GetMuteFadeSpeed9410x1800c3050
    FMOD_SoundGroup_GetName9420x1800c3060
    FMOD_SoundGroup_GetNumPlaying9430x1800c3070
    FMOD_SoundGroup_GetNumSounds9440x1800c3080
    FMOD_SoundGroup_GetSound9450x1800c3090
    FMOD_SoundGroup_GetSystemObject9460x1800c30a0
    FMOD_SoundGroup_GetUserData9470x1800c30b0
    FMOD_SoundGroup_GetVolume9480x1800c30c0
    FMOD_SoundGroup_Release9490x1800c30d0
    FMOD_SoundGroup_SetMaxAudible9500x1800c30e0
    FMOD_SoundGroup_SetMaxAudibleBehavior9510x1800c30f0
    FMOD_SoundGroup_SetMuteFadeSpeed9520x1800c3100
    FMOD_SoundGroup_SetUserData9530x1800c3110
    FMOD_SoundGroup_SetVolume9540x1800c3120
    FMOD_SoundGroup_Stop9550x1800c3130
    FMOD_Sound_AddSyncPoint9560x1800c3140
    FMOD_Sound_DeleteSyncPoint9570x1800c3150
    FMOD_Sound_Get3DConeSettings9580x1800c3160
    FMOD_Sound_Get3DCustomRolloff9590x1800c3170
    FMOD_Sound_Get3DMinMaxDistance9600x1800c3180
    FMOD_Sound_GetDefaults9610x1800c3190
    FMOD_Sound_GetFormat9620x1800c31a0
    FMOD_Sound_GetLength9630x1800c31b0
    FMOD_Sound_GetLoopCount9640x1800c31c0
    FMOD_Sound_GetLoopPoints9650x1800c31d0
    FMOD_Sound_GetMode9660x1800c31e0
    FMOD_Sound_GetMusicChannelVolume9670x1800c31f0
    FMOD_Sound_GetMusicNumChannels9680x1800c3200
    FMOD_Sound_GetMusicSpeed9690x1800c3210
    FMOD_Sound_GetName9700x1800c3220
    FMOD_Sound_GetNumSubSounds9710x1800c3230
    FMOD_Sound_GetNumSyncPoints9720x1800c3240
    FMOD_Sound_GetNumTags9730x1800c3250
    FMOD_Sound_GetOpenState9740x1800c3260
    FMOD_Sound_GetSoundGroup9750x1800c32c0
    FMOD_Sound_GetSubSound9760x1800c32d0
    FMOD_Sound_GetSubSoundParent9770x1800c32e0
    FMOD_Sound_GetSyncPoint9780x1800c32f0
    FMOD_Sound_GetSyncPointInfo9790x1800c3300
    FMOD_Sound_GetSystemObject9800x1800c3310
    FMOD_Sound_GetTag9810x1800c3320
    FMOD_Sound_GetUserData9820x1800c3330
    FMOD_Sound_Lock9830x1800c3340
    FMOD_Sound_ReadData9840x1800c3350
    FMOD_Sound_Release9850x1800c3360
    FMOD_Sound_SeekData9860x1800c3370
    FMOD_Sound_Set3DConeSettings9870x1800c3380
    FMOD_Sound_Set3DCustomRolloff9880x1800c3390
    FMOD_Sound_Set3DMinMaxDistance9890x1800c33a0
    FMOD_Sound_SetDefaults9900x1800c33b0
    FMOD_Sound_SetLoopCount9910x1800c33c0
    FMOD_Sound_SetLoopPoints9920x1800c33d0
    FMOD_Sound_SetMode9930x1800c33e0
    FMOD_Sound_SetMusicChannelVolume9940x1800c33f0
    FMOD_Sound_SetMusicSpeed9950x1800c3400
    FMOD_Sound_SetSoundGroup9960x1800c3410
    FMOD_Sound_SetUserData9970x1800c3420
    FMOD_Sound_Unlock9980x1800c3430
    FMOD_System_AttachChannelGroupToPort9990x1800c3440
    FMOD_System_AttachFileSystem10000x1800c3460
    FMOD_System_Close10010x1800c3470
    FMOD_System_Create10020x1800c3480
    FMOD_System_CreateChannelGroup10030x1800c3560
    FMOD_System_CreateDSP10040x1800c3570
    FMOD_System_CreateDSPByPlugin10050x1800c3580
    FMOD_System_CreateDSPByType10060x1800c3590
    FMOD_System_CreateGeometry10070x1800c35a0
    FMOD_System_CreateReverb3D10080x1800c35b0
    FMOD_System_CreateSound10090x1800c35c0
    FMOD_System_CreateSoundGroup10100x1800c35d0
    FMOD_System_CreateStream10110x1800c35e0
    FMOD_System_DetachChannelGroupFromPort10120x1800c35f0
    FMOD_System_Get3DListenerAttributes10130x1800c3600
    FMOD_System_Get3DNumListeners10140x1800c3610
    FMOD_System_Get3DSettings10150x1800c3620
    FMOD_System_GetAdvancedSettings10160x1800c3630
    FMOD_System_GetCPUUsage10170x1800c3640
    FMOD_System_GetChannel10180x1800c3650
    FMOD_System_GetChannelsPlaying10190x1800c3660
    FMOD_System_GetDSPBufferSize10200x1800c3670
    FMOD_System_GetDSPInfoByPlugin10210x1800c3680
    FMOD_System_GetDefaultMixMatrix10220x1800c3690
    FMOD_System_GetDriver10230x1800c36a0
    FMOD_System_GetDriverInfo10240x1800c36b0
    FMOD_System_GetFileUsage10250x1800c36c0
    FMOD_System_GetGeometryOcclusion10260x1800c36d0
    FMOD_System_GetGeometrySettings10270x1800c36e0
    FMOD_System_GetMasterChannelGroup10280x1800c36f0
    FMOD_System_GetMasterSoundGroup10290x1800c3700
    FMOD_System_GetNestedPlugin10300x1800c3710
    FMOD_System_GetNetworkProxy10310x1800c3720
    FMOD_System_GetNetworkTimeout10320x1800c3730
    FMOD_System_GetNumDrivers10330x1800c3740
    FMOD_System_GetNumNestedPlugins10340x1800c3750
    FMOD_System_GetNumPlugins10350x1800c3760
    FMOD_System_GetOutput10360x1800c3770
    FMOD_System_GetOutputByPlugin10370x1800c3780
    FMOD_System_GetOutputHandle10380x1800c3790
    FMOD_System_GetPluginHandle10390x1800c37a0
    FMOD_System_GetPluginInfo10400x1800c37b0
    FMOD_System_GetRecordDriverInfo10410x1800c37c0
    FMOD_System_GetRecordNumDrivers10420x1800c37d0
    FMOD_System_GetRecordPosition10430x1800c37e0
    FMOD_System_GetReverbProperties10440x1800c37f0
    FMOD_System_GetSoftwareChannels10450x1800c3800
    FMOD_System_GetSoftwareFormat10460x1800c3810
    FMOD_System_GetSoundRAM10470x1800c3820
    FMOD_System_GetSpeakerModeChannels10480x1800c3830
    FMOD_System_GetSpeakerPosition10490x1800c3840
    FMOD_System_GetStreamBufferSize10500x1800c3880
    FMOD_System_GetUserData10510x1800c3890
    FMOD_System_GetVersion10520x1800c38a0
    FMOD_System_Init10530x1800c38b0
    FMOD_System_IsRecording10540x1800c38c0
    FMOD_System_LoadGeometry10550x1800c3900
    FMOD_System_LoadPlugin10560x1800c3910
    FMOD_System_LockDSP10570x1800c3920
    FMOD_System_MixerResume10580x1800c3930
    FMOD_System_MixerSuspend10590x1800c3940
    FMOD_System_PlayDSP10600x1800c3950
    FMOD_System_PlaySound10610x1800c3970
    FMOD_System_RecordStart10620x1800c3990
    FMOD_System_RecordStop10630x1800c39b0
    FMOD_System_RegisterCodec10640x1800c39c0
    FMOD_System_RegisterDSP10650x1800c39d0
    FMOD_System_RegisterOutput10660x1800c39e0
    FMOD_System_Release10670x1800c39f0
    FMOD_System_Set3DListenerAttributes10680x1800c3a00
    FMOD_System_Set3DNumListeners10690x1800c3a10
    FMOD_System_Set3DRolloffCallback10700x1800c3a20
    FMOD_System_Set3DSettings10710x1800c3a30
    FMOD_System_SetAdvancedSettings10720x1800c3a40
    FMOD_System_SetCallback10730x1800c3a50
    FMOD_System_SetDSPBufferSize10740x1800c3a60
    FMOD_System_SetDriver10750x1800c3a70
    FMOD_System_SetFileSystem10760x1800c3a80
    FMOD_System_SetGeometrySettings10770x1800c3a90
    FMOD_System_SetNetworkProxy10780x1800c3aa0
    FMOD_System_SetNetworkTimeout10790x1800c3ab0
    FMOD_System_SetOutput10800x1800c3ac0
    FMOD_System_SetOutputByPlugin10810x1800c3ad0
    FMOD_System_SetPluginPath10820x1800c3ae0
    FMOD_System_SetReverbProperties10830x1800c3af0
    FMOD_System_SetSoftwareChannels10840x1800c3b00
    FMOD_System_SetSoftwareFormat10850x1800c3b10
    FMOD_System_SetSpeakerPosition10860x1800c3b20
    FMOD_System_SetStreamBufferSize10870x1800c3b40
    FMOD_System_SetUserData10880x1800c3b50
    FMOD_System_UnloadPlugin10890x1800c3b60
    FMOD_System_UnlockDSP10900x1800c3b70
    FMOD_System_Update10910x1800c3b80
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Sep 29, 2024 01:03:41.981884003 CEST5363767162.159.36.2192.168.2.4
    Sep 29, 2024 01:03:42.508903980 CEST5787053192.168.2.41.1.1.1
    Sep 29, 2024 01:03:42.526824951 CEST53578701.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Sep 29, 2024 01:03:42.508903980 CEST192.168.2.41.1.1.10xb306Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Sep 29, 2024 01:03:42.526824951 CEST1.1.1.1192.168.2.40xb306Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:19:03:10
    Start date:28/09/2024
    Path:C:\Windows\System32\loaddll64.exe
    Wow64 process (32bit):false
    Commandline:loaddll64.exe "C:\Users\user\Desktop\file.dll"
    Imagebase:0x7ff736220000
    File size:165'888 bytes
    MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:1
    Start time:19:03:10
    Start date:28/09/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:19:03:10
    Start date:28/09/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
    Imagebase:0x7ff694980000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:19:03:10
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:19:03:10
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",#1
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:19:03:10
    Start date:28/09/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 7556 -s 396
    Imagebase:0x7ff6407c0000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:9
    Start time:19:03:10
    Start date:28/09/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 7572 -s 404
    Imagebase:0x7ff6407c0000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:19:03:13
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@Z
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:11
    Start time:19:03:16
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@Z
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:12
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",?addCallback@AsyncThread@FMOD@@QEAA?AW4FMOD_RESULT@@P6A?AW43@H@Z@Z
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:13
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",?addDSP@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@HPEAVDSP@2@@Z
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:14
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",?addFadePoint@ChannelControl@FMOD@@QEAA?AW4FMOD_RESULT@@_KM@Z
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:15
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Update
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:16
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UnlockDSP
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:17
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_UnloadPlugin
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:18
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetUserData
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:19
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetStreamBufferSize
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:20
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSpeakerPosition
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:22
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSoftwareFormat
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:23
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetSoftwareChannels
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:24
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetReverbProperties
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:25
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetPluginPath
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:26
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetOutputByPlugin
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:27
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetOutput
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:28
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetNetworkTimeout
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:29
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetNetworkProxy
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:30
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetGeometrySettings
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:31
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetFileSystem
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:32
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetDriver
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:33
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetDSPBufferSize
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:34
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetCallback
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:35
    Start time:19:03:19
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_SetAdvancedSettings
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:36
    Start time:19:03:20
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DSettings
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:37
    Start time:19:03:20
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DRolloffCallback
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:38
    Start time:19:03:20
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DNumListeners
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:39
    Start time:19:03:20
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Set3DListenerAttributes
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:40
    Start time:19:03:20
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_Release
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:41
    Start time:19:03:20
    Start date:28/09/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",FMOD_System_RegisterOutput
    Imagebase:0x7ff6cdc30000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:0.1%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:2%
      Total number of Nodes:98
      Total number of Limit Nodes:3
      execution_graph 84572 7ffdfb7c7950 84573 7ffdfb7c796c 84572->84573 84575 7ffdfb7c7971 84572->84575 84630 7ffdfb7d4040 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 84573->84630 84579 7ffdfb7c79fc _DllMainCRTStartup 84575->84579 84580 7ffdfb7c79c6 84575->84580 84582 7ffdfb7c77f0 84575->84582 84576 7ffdfb7c7a43 84578 7ffdfb7c77f0 _CRT_INIT 115 API calls 84576->84578 84576->84580 84578->84580 84579->84576 84579->84580 84581 7ffdfb7c77f0 _CRT_INIT 115 API calls 84579->84581 84581->84576 84583 7ffdfb7c787f 84582->84583 84584 7ffdfb7c7802 84582->84584 84586 7ffdfb7c78d5 84583->84586 84592 7ffdfb7c7883 _CRT_INIT 84583->84592 84631 7ffdfb7d19c8 GetProcessHeap 84584->84631 84587 7ffdfb7c7938 84586->84587 84588 7ffdfb7c78da 84586->84588 84619 7ffdfb7c780b _CRT_INIT 84587->84619 84690 7ffdfb7d0214 68 API calls 2 library calls 84587->84690 84689 7ffdfb7ca574 TlsGetValue 84588->84689 84589 7ffdfb7c7807 84589->84619 84632 7ffdfb7d03bc 84589->84632 84592->84619 84685 7ffdfb7cc09c 70 API calls free 84592->84685 84596 7ffdfb7c78ab 84607 7ffdfb7c78ba _CRT_INIT 84596->84607 84686 7ffdfb7d2148 69 API calls free 84596->84686 84599 7ffdfb7c7817 _RTC_Initialize 84602 7ffdfb7c7827 GetCommandLineA 84599->84602 84599->84619 84601 7ffdfb7c78b5 84687 7ffdfb7d043c TlsFree _mtterm 84601->84687 84649 7ffdfb7d40f4 GetEnvironmentStringsW 84602->84649 84607->84619 84688 7ffdfb7d043c TlsFree _mtterm 84607->84688 84613 7ffdfb7c7845 84616 7ffdfb7c7849 84613->84616 84617 7ffdfb7c7850 84613->84617 84680 7ffdfb7d043c TlsFree _mtterm 84616->84680 84681 7ffdfb7d3c50 81 API calls 3 library calls 84617->84681 84619->84579 84622 7ffdfb7c7855 84623 7ffdfb7c7869 84622->84623 84682 7ffdfb7d3f0c 80 API calls 5 library calls 84622->84682 84629 7ffdfb7c786d 84623->84629 84684 7ffdfb7d2148 69 API calls free 84623->84684 84626 7ffdfb7c785e 84626->84623 84683 7ffdfb7cc21c 79 API calls 3 library calls 84626->84683 84627 7ffdfb7c787d 84627->84616 84629->84619 84630->84575 84631->84589 84691 7ffdfb7cc2d8 EncodePointer 84632->84691 84634 7ffdfb7d03c7 84635 7ffdfb7cbccc _mtinitlocks InitializeCriticalSectionAndSpinCount 84634->84635 84636 7ffdfb7d03cc 84635->84636 84637 7ffdfb7d042e 84636->84637 84639 7ffdfb7ca53c _mtinit TlsAlloc 84636->84639 84638 7ffdfb7d043c _mtterm TlsFree 84637->84638 84640 7ffdfb7d0433 84638->84640 84641 7ffdfb7d03dc 84639->84641 84640->84599 84641->84637 84642 7ffdfb7d2268 _calloc_crt 68 API calls 84641->84642 84643 7ffdfb7d03f6 84642->84643 84643->84637 84644 7ffdfb7ca590 _freeptd TlsSetValue 84643->84644 84645 7ffdfb7d040c 84644->84645 84645->84637 84646 7ffdfb7d0410 84645->84646 84647 7ffdfb7d02f8 _initptd 68 API calls 84646->84647 84648 7ffdfb7d041a GetCurrentThreadId 84647->84648 84648->84640 84650 7ffdfb7c7839 84649->84650 84651 7ffdfb7d4122 WideCharToMultiByte 84649->84651 84662 7ffdfb7d1e1c 84650->84662 84653 7ffdfb7d4171 84651->84653 84654 7ffdfb7d41c2 FreeEnvironmentStringsW 84651->84654 84696 7ffdfb7d22e8 68 API calls malloc 84653->84696 84654->84650 84656 7ffdfb7d4179 84656->84654 84657 7ffdfb7d4181 WideCharToMultiByte 84656->84657 84658 7ffdfb7d41a9 84657->84658 84659 7ffdfb7d41b4 FreeEnvironmentStringsW 84657->84659 84697 7ffdfb7c55b8 68 API calls 2 library calls 84658->84697 84659->84650 84661 7ffdfb7d41b1 84661->84659 84698 7ffdfb7cbb44 84662->84698 84664 7ffdfb7d1e4b 84665 7ffdfb7d2268 _calloc_crt 68 API calls 84664->84665 84667 7ffdfb7d1e5f 84665->84667 84666 7ffdfb7d1eda GetStartupInfoW 84674 7ffdfb7d2034 84666->84674 84676 7ffdfb7d1ef4 84666->84676 84667->84666 84668 7ffdfb7d1e6f _ioinit 84667->84668 84668->84613 84669 7ffdfb7d211a 84670 7ffdfb7cbd2c _wgetenv LeaveCriticalSection 84669->84670 84670->84668 84671 7ffdfb7d207f GetStdHandle 84672 7ffdfb7d20aa GetFileType 84671->84672 84671->84674 84672->84674 84673 7ffdfb7d2268 _calloc_crt 68 API calls 84673->84676 84674->84669 84674->84671 84677 7ffdfb7d20da InitializeCriticalSectionAndSpinCount 84674->84677 84675 7ffdfb7d1f50 84675->84674 84678 7ffdfb7d1fd8 GetFileType 84675->84678 84679 7ffdfb7d1fe2 InitializeCriticalSectionAndSpinCount 84675->84679 84676->84673 84676->84674 84676->84675 84677->84674 84678->84675 84678->84679 84679->84675 84681->84622 84682->84626 84683->84623 84684->84627 84685->84596 84686->84601 84690->84619 84692 7ffdfb7cc2f1 _init_pointers 84691->84692 84695 7ffdfb7d639c EncodePointer 84692->84695 84694 7ffdfb7cc319 84695->84694 84696->84656 84697->84661 84699 7ffdfb7cbb62 84698->84699 84700 7ffdfb7cbb73 EnterCriticalSection 84698->84700 84704 7ffdfb7cbc10 68 API calls 7 library calls 84699->84704 84702 7ffdfb7cbb67 84702->84700 84705 7ffdfb7cc1e4 68 API calls 3 library calls 84702->84705 84704->84702

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 375 7ffdfb7d11f0-7ffdfb7d1238 call 7ffdfb7c2890 378 7ffdfb7d123a-7ffdfb7d123c 375->378 379 7ffdfb7d1241-7ffdfb7d1244 375->379 382 7ffdfb7d1902-7ffdfb7d192b call 7ffdfb7c28f0 378->382 380 7ffdfb7d1265-7ffdfb7d1297 379->380 381 7ffdfb7d1246-7ffdfb7d1260 call 7ffdfb7c5e78 call 7ffdfb7c5ee8 call 7ffdfb7c8578 379->381 385 7ffdfb7d1299-7ffdfb7d12a0 380->385 386 7ffdfb7d12a2-7ffdfb7d12a8 380->386 381->382 385->381 385->386 389 7ffdfb7d12aa-7ffdfb7d12b2 call 7ffdfb7d57e4 386->389 390 7ffdfb7d12b7-7ffdfb7d12c0 call 7ffdfb7d56a0 386->390 389->390 397 7ffdfb7d12c6-7ffdfb7d12d7 390->397 398 7ffdfb7d1582-7ffdfb7d1593 390->398 397->398 399 7ffdfb7d12dd-7ffdfb7d1311 call 7ffdfb7d0250 GetConsoleMode 397->399 401 7ffdfb7d1599-7ffdfb7d15a5 398->401 402 7ffdfb7d1864-7ffdfb7d1880 WriteFile 398->402 399->398 415 7ffdfb7d1317-7ffdfb7d1319 399->415 403 7ffdfb7d15ab-7ffdfb7d15ae 401->403 404 7ffdfb7d1673-7ffdfb7d1677 401->404 406 7ffdfb7d188a-7ffdfb7d1890 GetLastError 402->406 407 7ffdfb7d1882-7ffdfb7d1888 402->407 408 7ffdfb7d18c2-7ffdfb7d18d8 403->408 409 7ffdfb7d15b4 403->409 412 7ffdfb7d1752-7ffdfb7d1755 404->412 413 7ffdfb7d167d-7ffdfb7d1680 404->413 411 7ffdfb7d1892-7ffdfb7d1894 406->411 407->411 416 7ffdfb7d18da-7ffdfb7d18de 408->416 417 7ffdfb7d18e4-7ffdfb7d18f4 call 7ffdfb7c5ee8 call 7ffdfb7c5e78 408->417 414 7ffdfb7d15b7-7ffdfb7d15c2 409->414 419 7ffdfb7d18fc-7ffdfb7d1900 411->419 420 7ffdfb7d1896-7ffdfb7d1898 411->420 412->408 418 7ffdfb7d175b 412->418 413->408 421 7ffdfb7d1686 413->421 422 7ffdfb7d15c4-7ffdfb7d15cd 414->422 423 7ffdfb7d131b-7ffdfb7d131e 415->423 424 7ffdfb7d1324-7ffdfb7d1338 GetConsoleCP 415->424 416->378 416->417 417->419 425 7ffdfb7d1761-7ffdfb7d1766 418->425 419->382 420->408 427 7ffdfb7d189a-7ffdfb7d189d 420->427 428 7ffdfb7d168b-7ffdfb7d1696 421->428 429 7ffdfb7d15f5-7ffdfb7d1638 WriteFile 422->429 430 7ffdfb7d15cf-7ffdfb7d15d8 422->430 423->398 423->424 431 7ffdfb7d1579-7ffdfb7d157d 424->431 432 7ffdfb7d133e-7ffdfb7d1341 424->432 433 7ffdfb7d1768-7ffdfb7d1771 425->433 435 7ffdfb7d18b6-7ffdfb7d18bd call 7ffdfb7c5e98 427->435 436 7ffdfb7d189f-7ffdfb7d18af call 7ffdfb7c5ee8 call 7ffdfb7c5e78 427->436 437 7ffdfb7d1698-7ffdfb7d16a1 428->437 429->406 445 7ffdfb7d163e-7ffdfb7d1654 429->445 441 7ffdfb7d15da-7ffdfb7d15e1 430->441 442 7ffdfb7d15e4-7ffdfb7d15f3 430->442 431->420 443 7ffdfb7d14cb-7ffdfb7d14d0 432->443 444 7ffdfb7d1347-7ffdfb7d1366 432->444 446 7ffdfb7d17a2-7ffdfb7d17eb WideCharToMultiByte 433->446 447 7ffdfb7d1773-7ffdfb7d1780 433->447 435->408 436->435 438 7ffdfb7d16a3-7ffdfb7d16b0 437->438 439 7ffdfb7d16d4-7ffdfb7d1717 WriteFile 437->439 450 7ffdfb7d16b2-7ffdfb7d16bc 438->450 451 7ffdfb7d16c0-7ffdfb7d16d2 438->451 439->406 452 7ffdfb7d171d-7ffdfb7d1733 439->452 441->442 442->422 442->429 459 7ffdfb7d14d2-7ffdfb7d14ee 443->459 460 7ffdfb7d14f0 443->460 454 7ffdfb7d1388-7ffdfb7d1392 call 7ffdfb7d5910 444->454 455 7ffdfb7d1368-7ffdfb7d1386 444->455 445->411 456 7ffdfb7d165a-7ffdfb7d1668 445->456 446->406 462 7ffdfb7d17f1 446->462 457 7ffdfb7d1782-7ffdfb7d178a 447->457 458 7ffdfb7d178e-7ffdfb7d17a0 447->458 450->451 451->437 451->439 452->411 465 7ffdfb7d1739-7ffdfb7d1747 452->465 481 7ffdfb7d13c8-7ffdfb7d13ce 454->481 482 7ffdfb7d1394-7ffdfb7d13a1 454->482 466 7ffdfb7d13d1-7ffdfb7d13de call 7ffdfb7da40c 455->466 456->414 469 7ffdfb7d166e 456->469 457->458 458->433 458->446 470 7ffdfb7d14f5-7ffdfb7d14fa 459->470 460->470 468 7ffdfb7d17f3-7ffdfb7d182d WriteFile 462->468 465->428 477 7ffdfb7d174d 465->477 488 7ffdfb7d13e4-7ffdfb7d1421 WideCharToMultiByte 466->488 489 7ffdfb7d1570-7ffdfb7d1574 466->489 474 7ffdfb7d183d-7ffdfb7d1845 GetLastError 468->474 475 7ffdfb7d182f-7ffdfb7d1839 468->475 469->411 471 7ffdfb7d153b 470->471 472 7ffdfb7d14fc-7ffdfb7d150b call 7ffdfb7da414 470->472 480 7ffdfb7d1540-7ffdfb7d1548 471->480 472->406 493 7ffdfb7d1511-7ffdfb7d1517 472->493 484 7ffdfb7d1849-7ffdfb7d184b 474->484 475->468 483 7ffdfb7d183b 475->483 477->411 480->489 490 7ffdfb7d154a 480->490 481->466 491 7ffdfb7d13a7-7ffdfb7d13bd call 7ffdfb7da40c 482->491 492 7ffdfb7d154f-7ffdfb7d1567 482->492 483->484 484->411 487 7ffdfb7d184d-7ffdfb7d185c 484->487 487->425 495 7ffdfb7d1862 487->495 488->489 496 7ffdfb7d1427-7ffdfb7d1456 WriteFile 488->496 489->411 490->432 491->489 501 7ffdfb7d13c3-7ffdfb7d13c6 491->501 492->489 493->471 497 7ffdfb7d1519-7ffdfb7d152f call 7ffdfb7da414 493->497 495->411 496->406 498 7ffdfb7d145c-7ffdfb7d146a 496->498 497->406 505 7ffdfb7d1535-7ffdfb7d1537 497->505 498->489 502 7ffdfb7d1470-7ffdfb7d147a 498->502 501->488 502->480 504 7ffdfb7d1480-7ffdfb7d14b2 WriteFile 502->504 504->406 506 7ffdfb7d14b8-7ffdfb7d14bd 504->506 505->471 506->489 507 7ffdfb7d14c3-7ffdfb7d14c9 506->507 507->480
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: __doserrno_errno_invalid_parameter_noinfo
      • String ID: U
      • API String ID: 3902385426-4171548499
      • Opcode ID: 60fb80a9f65fb98c3fc72a26895f1301df05b065da6d6a8a0ca4402a91eb8644
      • Instruction ID: bcf5f07c114e3bb491206b2344b488fc0b53776d64274da00e018ddec499ef11
      • Opcode Fuzzy Hash: 60fb80a9f65fb98c3fc72a26895f1301df05b065da6d6a8a0ca4402a91eb8644
      • Instruction Fuzzy Hash: 6412B122B1974386EB208F14D464B7A77A1FB88794F504136EA9E46AFCCF3DE549CB10

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 753 7ffdfb6e0f00-7ffdfb6e0f8a 754 7ffdfb6e0f90-7ffdfb6e0fbf call 7ffdfb7c4b60 753->754 757 7ffdfb6e0fc1-7ffdfb6e0fda 754->757 758 7ffdfb6e0fdc-7ffdfb6e0ff4 757->758 759 7ffdfb6e1025-7ffdfb6e103c 757->759 761 7ffdfb6e1000-7ffdfb6e1023 call 7ffdfb7c3d90 758->761 760 7ffdfb6e1040-7ffdfb6e1089 call 7ffdfb7c4b60 * 2 759->760 768 7ffdfb6e108b-7ffdfb6e1094 760->768 761->759 769 7ffdfb6e1096-7ffdfb6e10ae 768->769 770 7ffdfb6e10d2-7ffdfb6e10e8 768->770 771 7ffdfb6e10b0-7ffdfb6e10d0 call 7ffdfb7c3d90 769->771 772 7ffdfb6e10f0-7ffdfb6e1133 770->772 771->770 772->772 774 7ffdfb6e1135-7ffdfb6e1165 772->774 776 7ffdfb6e1170-7ffdfb6e1200 call 7ffdfb7c3540 call 7ffdfb7c3240 call 7ffdfb7c3540 call 7ffdfb7c3240 774->776 785 7ffdfb6e1206-7ffdfb6e121b 776->785 786 7ffdfb6e1220-7ffdfb6e12fb call 7ffdfb7c3240 * 2 call 7ffdfb7c3540 call 7ffdfb7c3240 call 7ffdfb7c3540 call 7ffdfb7c3240 785->786 799 7ffdfb6e1301-7ffdfb6e1315 786->799 800 7ffdfb6e1320-7ffdfb6e134c call 7ffdfb7c3240 799->800 803 7ffdfb6e134e-7ffdfb6e1362 800->803 804 7ffdfb6e1370-7ffdfb6e139c call 7ffdfb7c3240 803->804 807 7ffdfb6e139e-7ffdfb6e1450 call 7ffdfb7c3240 * 8 804->807 824 7ffdfb6e1456-7ffdfb6e147e 807->824 825 7ffdfb6e1512-7ffdfb6e151e 807->825 828 7ffdfb6e1482-7ffdfb6e1506 call 7ffdfb7c4b40 call 7ffdfb7c4b70 824->828 826 7ffdfb6e1586-7ffdfb6e159e 825->826 827 7ffdfb6e1520-7ffdfb6e153a 825->827 831 7ffdfb6e15a4-7ffdfb6e15aa 826->831 830 7ffdfb6e1540-7ffdfb6e1584 call 7ffdfb7c3540 call 7ffdfb7c3240 827->830 845 7ffdfb6e150c 828->845 830->826 834 7ffdfb6e15ac-7ffdfb6e15b9 831->834 835 7ffdfb6e15d4-7ffdfb6e15d8 831->835 840 7ffdfb6e15c0-7ffdfb6e15d2 834->840 836 7ffdfb6e15da-7ffdfb6e15e7 835->836 837 7ffdfb6e160c-7ffdfb6e161a 835->837 841 7ffdfb6e15f0-7ffdfb6e160a 836->841 837->831 843 7ffdfb6e161c-7ffdfb6e1634 837->843 840->835 840->840 841->837 841->841 846 7ffdfb6e1640-7ffdfb6e1646 843->846 845->825 848 7ffdfb6e1650-7ffdfb6e1674 call 7ffdfb7c3d90 846->848 851 7ffdfb6e1676-7ffdfb6e1681 848->851 852 7ffdfb6e16a4-7ffdfb6e16df 848->852 854 7ffdfb6e1697-7ffdfb6e16a1 call 7ffdfb7c3d90 851->854 855 7ffdfb6e1683-7ffdfb6e1695 call 7ffdfb7c3d90 851->855 852->848 853 7ffdfb6e16e5-7ffdfb6e16ee 852->853 853->846 856 7ffdfb6e16f4-7ffdfb6e1748 853->856 854->852 855->852 859 7ffdfb6e1750-7ffdfb6e186c 856->859 862 7ffdfb6e1870-7ffdfb6e18c7 859->862 862->862 863 7ffdfb6e18c9-7ffdfb6e18e9 862->863 864 7ffdfb6e18f0-7ffdfb6e1947 863->864 864->864 865 7ffdfb6e1949-7ffdfb6e1962 864->865 866 7ffdfb6e1970-7ffdfb6e1998 865->866 866->866 867 7ffdfb6e199a-7ffdfb6e19c5 866->867 867->859 868 7ffdfb6e19cb-7ffdfb6e1a0d 867->868 869 7ffdfb6e1a10-7ffdfb6e1a16 868->869 870 7ffdfb6e1a20-7ffdfb6e1a4a 869->870 870->870 871 7ffdfb6e1a4c-7ffdfb6e1a52 870->871 872 7ffdfb6e1a60-7ffdfb6e1a89 871->872 872->872 873 7ffdfb6e1a8b-7ffdfb6e1a9c 872->873 873->869 874 7ffdfb6e1aa2-7ffdfb6e1ac4 873->874 875 7ffdfb6e1ad0-7ffdfb6e1ad3 874->875 876 7ffdfb6e1ae0-7ffdfb6e1b3e 875->876 876->876 877 7ffdfb6e1b40-7ffdfb6e1b47 876->877 877->875 878 7ffdfb6e1b49-7ffdfb6e1b4c 877->878 879 7ffdfb6e1b53-7ffdfb6e1b56 878->879 880 7ffdfb6e1b60-7ffdfb6e1ba4 879->880 880->880 881 7ffdfb6e1ba6-7ffdfb6e1bad 880->881 881->879 882 7ffdfb6e1baf-7ffdfb6e1bb4 881->882 883 7ffdfb6e1bc0-7ffdfb6e1c31 882->883 883->883 884 7ffdfb6e1c33-7ffdfb6e1c45 883->884 885 7ffdfb6e1c50-7ffdfb6e1c53 884->885 886 7ffdfb6e1c60-7ffdfb6e1c63 885->886 887 7ffdfb6e1c70-7ffdfb6e1cc5 886->887 887->887 888 7ffdfb6e1cc7-7ffdfb6e1cce 887->888 888->886 889 7ffdfb6e1cd0-7ffdfb6e1cd7 888->889 889->885 890 7ffdfb6e1cdd-7ffdfb6e1ce7 889->890 891 7ffdfb6e1cf0-7ffdfb6e1cff 890->891 892 7ffdfb6e1d00-7ffdfb6e1d44 891->892 892->892 893 7ffdfb6e1d46-7ffdfb6e1d4d 892->893 893->891 894 7ffdfb6e1d4f-7ffdfb6e1d58 893->894
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cosf$powfsinf
      • String ID:
      • API String ID: 846725008-0
      • Opcode ID: 51c938ad4cff7153dacdbadf22e87802635ea08a14a73a4f89531117666426d4
      • Instruction ID: e0498868942c4663c8547c507b3ee28ceabcf6e1823746558147d4b3ad9ba926
      • Opcode Fuzzy Hash: 51c938ad4cff7153dacdbadf22e87802635ea08a14a73a4f89531117666426d4
      • Instruction Fuzzy Hash: 5482D172F2978A86E3018F35D451BBCB7A0FF59784F159336E609636A5EB38A191CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _errnowrite_multi_charwrite_string$_invalid_parameter_noinfowrite_char$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
      • String ID: $@
      • API String ID: 3204631660-1077428164
      • Opcode ID: 3b75bddbcdc35393a756c72af49d7a983cb45f098c6837e9ac3f2a83a300b96d
      • Instruction ID: 72593bd4188ccbf4084ab4dc9de9def3ec4428d9c23749724c910a764b1d88cf
      • Opcode Fuzzy Hash: 3b75bddbcdc35393a756c72af49d7a983cb45f098c6837e9ac3f2a83a300b96d
      • Instruction Fuzzy Hash: 4A52E6A6B0E76B96FB648A159464B7E7BA0BF41740F141039EA6E067FCDF3CE9408700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: DecodePointerwrite_multi_char$_errnowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_getptd_getptd_noexit_invalid_parameter_noinfo_isleadbyte_l_malloc_crtfree
      • String ID: 0 == dspsBlockSize % 2
      • API String ID: 448788376-1091591475
      • Opcode ID: 2fc14b178793c967eec4ccb432f9fe68790eab68cb30a1bdc126ac47dd94f9c9
      • Instruction ID: 6204e848af7c11adf2c57e64a0fa58338152e5c4e54b85b70ca55cfa45e7f930
      • Opcode Fuzzy Hash: 2fc14b178793c967eec4ccb432f9fe68790eab68cb30a1bdc126ac47dd94f9c9
      • Instruction Fuzzy Hash: A552C266B0E74386FB648B159460A7E7BA0FB887D4F140135DA6E577F8DE3DE8098B00
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: CNAM$Chorus$Echo$F$FMOD IT Target Unit$FMOD IT final mixdown unit$Flanger$IMPI$IMPM$IMPS$Number of channels$PNAM$Sample name %d$Song message$X$X$c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\src\fmod_codec_it.cpp
      • API String ID: 0-1247982828
      • Opcode ID: 9aff1eafe67e49b2f50abfdc015ece5010912ffe32cd7e3e9241402ba371755c
      • Instruction ID: c69acc1b4736eb8ae0ab84b4bc0e58af62e878aee2aa395e42c6fae8c83ece72
      • Opcode Fuzzy Hash: 9aff1eafe67e49b2f50abfdc015ece5010912ffe32cd7e3e9241402ba371755c
      • Instruction Fuzzy Hash: 01536C7670A68786EB54DF25D460BB977A0FB88B48F444035DB6D8B7A9EF38E411CB00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2441 7ffdfb6cf9d0-7ffdfb6cfa81 2443 7ffdfb6cfa8b-7ffdfb6cfa9f 2441->2443 2444 7ffdfb6cfa83-7ffdfb6cfa86 call 7ffdfb777950 2441->2444 2447 7ffdfb6d0635-7ffdfb6d0653 call 7ffdfb7c28f0 2443->2447 2448 7ffdfb6cfaa5-7ffdfb6cfac4 call 7ffdfb75c3c0 2443->2448 2444->2443 2448->2447 2453 7ffdfb6cfaca-7ffdfb6cfb1a call 7ffdfb760ed0 2448->2453 2456 7ffdfb6cfb1c-7ffdfb6cfb21 2453->2456 2457 7ffdfb6cfb26-7ffdfb6cfb5d 2453->2457 2456->2447 2458 7ffdfb6cfb67 2457->2458 2459 7ffdfb6cfb5f-7ffdfb6cfb65 2457->2459 2460 7ffdfb6cfb6c-7ffdfb6cfb75 2458->2460 2459->2458 2459->2460 2461 7ffdfb6cfb77-7ffdfb6cfb80 2460->2461 2462 7ffdfb6cfb82 2460->2462 2461->2462 2463 7ffdfb6cfb87-7ffdfb6cfbb3 call 7ffdfb7c2920 2461->2463 2462->2463 2466 7ffdfb6cfbb9-7ffdfb6cfbc0 2463->2466 2467 7ffdfb6cfc5b-7ffdfb6cfc6d call 7ffdfb7c47d8 2463->2467 2466->2467 2469 7ffdfb6cfbc6-7ffdfb6cfbd3 call 7ffdfb7c45d0 2466->2469 2472 7ffdfb6cfbd8-7ffdfb6cfc22 call 7ffdfb7c2920 2467->2472 2473 7ffdfb6cfc73-7ffdfb6cfcb3 call 7ffdfb760c50 call 7ffdfb760bf0 call 7ffdfb7c4844 2467->2473 2469->2472 2478 7ffdfb6cfd16-7ffdfb6cfd1d 2472->2478 2479 7ffdfb6cfc28 2472->2479 2473->2472 2495 7ffdfb6cfcb9-7ffdfb6cfcf9 call 7ffdfb760c50 call 7ffdfb760bf0 call 7ffdfb7c4844 2473->2495 2483 7ffdfb6cfe15-7ffdfb6cfe70 call 7ffdfb75f610 2478->2483 2484 7ffdfb6cfd23-7ffdfb6cfd50 call 7ffdfb78f370 2478->2484 2482 7ffdfb6cfc30-7ffdfb6cfc48 call 7ffdfb760ed0 2479->2482 2496 7ffdfb6cfd09-7ffdfb6cfd10 2482->2496 2497 7ffdfb6cfc4e-7ffdfb6cfc54 2482->2497 2498 7ffdfb6cfe72-7ffdfb6cfead call 7ffdfb75f610 2483->2498 2499 7ffdfb6cfeaf-7ffdfb6cfeb4 2483->2499 2493 7ffdfb6cfd5c-7ffdfb6cfd5e 2484->2493 2494 7ffdfb6cfd52-7ffdfb6cfd57 2484->2494 2500 7ffdfb6d0625 2493->2500 2501 7ffdfb6cfd64-7ffdfb6cfd96 call 7ffdfb75f270 2493->2501 2494->2500 2495->2472 2529 7ffdfb6cfcff-7ffdfb6cfd04 2495->2529 2496->2478 2497->2482 2503 7ffdfb6cfc56 2497->2503 2498->2499 2509 7ffdfb6cfeb9-7ffdfb6cfecb 2498->2509 2499->2500 2508 7ffdfb6d062d 2500->2508 2514 7ffdfb6cfda5 2501->2514 2515 7ffdfb6cfd98-7ffdfb6cfda3 2501->2515 2503->2478 2508->2447 2512 7ffdfb6cff75-7ffdfb6cffaf 2509->2512 2513 7ffdfb6cfed1-7ffdfb6cfed4 2509->2513 2520 7ffdfb6cffb0-7ffdfb6cffc4 call 7ffdfb75c9a0 2512->2520 2517 7ffdfb6cfee0-7ffdfb6cff0d 2513->2517 2518 7ffdfb6cfda8-7ffdfb6cfdb2 2514->2518 2515->2518 2521 7ffdfb6cff14-7ffdfb6cff6f call 7ffdfb77ad50 2517->2521 2522 7ffdfb6cff0f call 7ffdfb7799a0 2517->2522 2518->2499 2523 7ffdfb6cfdb8-7ffdfb6cfe12 call 7ffdfb760c50 2518->2523 2533 7ffdfb6cffca-7ffdfb6cffe9 call 7ffdfb75c3c0 2520->2533 2534 7ffdfb6d061d 2520->2534 2521->2512 2521->2517 2522->2521 2523->2483 2529->2508 2533->2534 2537 7ffdfb6cffef-7ffdfb6d0034 call 7ffdfb760ed0 2533->2537 2534->2500 2540 7ffdfb6d003a-7ffdfb6d007a call 7ffdfb75f610 2537->2540 2541 7ffdfb6d00e1-7ffdfb6d00ee call 7ffdfb75c9a0 2537->2541 2546 7ffdfb6d055f-7ffdfb6d0564 2540->2546 2547 7ffdfb6d0080-7ffdfb6d00a0 call 7ffdfb75c3c0 2540->2547 2545 7ffdfb6d00f3-7ffdfb6d010b 2541->2545 2548 7ffdfb6d0115-7ffdfb6d0118 2545->2548 2549 7ffdfb6d010d-7ffdfb6d010f 2545->2549 2546->2534 2547->2534 2558 7ffdfb6d00a6-7ffdfb6d00df 2547->2558 2550 7ffdfb6d011a-7ffdfb6d0120 2548->2550 2551 7ffdfb6d012b-7ffdfb6d012f 2548->2551 2549->2520 2549->2548 2550->2551 2553 7ffdfb6d0122-7ffdfb6d0129 2550->2553 2554 7ffdfb6d0136-7ffdfb6d0149 2551->2554 2553->2554 2556 7ffdfb6d014b-7ffdfb6d0155 2554->2556 2557 7ffdfb6d0157-7ffdfb6d01a5 call 7ffdfb6cf520 call 7ffdfb6d0660 call 7ffdfb75f610 2554->2557 2556->2557 2557->2546 2565 7ffdfb6d01ab-7ffdfb6d01ca 2557->2565 2558->2545 2566 7ffdfb6d029b-7ffdfb6d029e 2565->2566 2567 7ffdfb6d01d0-7ffdfb6d01d8 2565->2567 2568 7ffdfb6d02b4-7ffdfb6d02d4 2566->2568 2569 7ffdfb6d02a0-7ffdfb6d02a5 2566->2569 2570 7ffdfb6d01e0-7ffdfb6d01ed 2567->2570 2572 7ffdfb6d02d7-7ffdfb6d02fc 2568->2572 2569->2568 2571 7ffdfb6d02a7-7ffdfb6d02b2 2569->2571 2573 7ffdfb6d023d-7ffdfb6d028d 2570->2573 2574 7ffdfb6d01ef-7ffdfb6d01f9 2570->2574 2571->2572 2577 7ffdfb6d0300-7ffdfb6d0303 2572->2577 2573->2570 2576 7ffdfb6d0293 2573->2576 2575 7ffdfb6d0200-7ffdfb6d0223 call 7ffdfb6d13d0 2574->2575 2584 7ffdfb6d022c 2575->2584 2585 7ffdfb6d0225-7ffdfb6d022a 2575->2585 2576->2566 2579 7ffdfb6d0309-7ffdfb6d0315 2577->2579 2580 7ffdfb6d0305-7ffdfb6d0307 2577->2580 2579->2577 2581 7ffdfb6d0317-7ffdfb6d034e call 7ffdfb6c19d0 2579->2581 2580->2579 2581->2534 2588 7ffdfb6d0354-7ffdfb6d0381 call 7ffdfb6c19d0 2581->2588 2587 7ffdfb6d022f-7ffdfb6d023b 2584->2587 2585->2584 2585->2587 2587->2573 2587->2575 2588->2534 2591 7ffdfb6d0387-7ffdfb6d039b 2588->2591 2592 7ffdfb6d03ea-7ffdfb6d046f call 7ffdfb75fa20 call 7ffdfb7a8a20 2591->2592 2593 7ffdfb6d039d 2591->2593 2592->2534 2603 7ffdfb6d0475-7ffdfb6d04e9 call 7ffdfb7451d0 call 7ffdfb745150 call 7ffdfb75f610 2592->2603 2594 7ffdfb6d03a0-7ffdfb6d03ab 2593->2594 2597 7ffdfb6d03d6-7ffdfb6d03e8 2594->2597 2598 7ffdfb6d03ad-7ffdfb6d03bf 2594->2598 2597->2592 2597->2594 2598->2597 2600 7ffdfb6d03c1-7ffdfb6d03d0 call 7ffdfb78be70 2598->2600 2600->2534 2600->2597 2611 7ffdfb6d04eb-7ffdfb6d04f3 call 7ffdfb77d9a0 2603->2611 2612 7ffdfb6d04f5 2603->2612 2614 7ffdfb6d04f8-7ffdfb6d0502 2611->2614 2612->2614 2614->2546 2616 7ffdfb6d0504-7ffdfb6d051c call 7ffdfb77db50 2614->2616 2616->2534 2619 7ffdfb6d0522-7ffdfb6d055d call 7ffdfb75f610 2616->2619 2619->2546 2622 7ffdfb6d0569-7ffdfb6d0573 2619->2622 2623 7ffdfb6d0575-7ffdfb6d0589 2622->2623 2624 7ffdfb6d05b6-7ffdfb6d05d4 call 7ffdfb6d0660 2622->2624 2625 7ffdfb6d058b call 7ffdfb774d50 2623->2625 2626 7ffdfb6d0590-7ffdfb6d05aa call 7ffdfb77dc80 2623->2626 2631 7ffdfb6d061b 2624->2631 2632 7ffdfb6d05d6-7ffdfb6d05e4 call 7ffdfb75b5a0 2624->2632 2625->2626 2626->2534 2635 7ffdfb6d05ac-7ffdfb6d05b4 2626->2635 2631->2534 2632->2534 2637 7ffdfb6d05e6-7ffdfb6d0614 call 7ffdfb75fa20 2632->2637 2635->2623 2635->2624 2637->2631
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _stat32i64$_wgetenv
      • String ID: /system32/drivers/etc/gm.dls$/system32/drivers/gm.dls$Channel mask$FMOD MIDI Target Unit$MThd$MTrk$Number of channels$c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\src\fmod_codec_midi.cpp$windir
      • API String ID: 2592534748-1618955755
      • Opcode ID: 8b41c2a8d04c09f32e6f34f7f6e6d242bc4be9578bdce9eaae3c2629c184f93f
      • Instruction ID: 86e26762221ea3ec3f9dd7f6dde835b23d7b7f24d3cd3517dc01e18e88a3478e
      • Opcode Fuzzy Hash: 8b41c2a8d04c09f32e6f34f7f6e6d242bc4be9578bdce9eaae3c2629c184f93f
      • Instruction Fuzzy Hash: 2E728B72B06B868AEB11CF25D460BA937A4FB88B88F584135CE5C9B7ADDF38D545C700
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: $@$FMOD S3M Target Unit$Number of channels$SCRM$Sample name %d$c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\src\fmod_codec_s3m.cpp
      • API String ID: 0-3027062726
      • Opcode ID: 34396bf3e71e6db16ef800dbe07c633deb27e43828bb614437cc9c954da12bf6
      • Instruction ID: 657dc76d3cfaea317b3dca92f491f493f23ab033a0b91987d506e0b01ea69e53
      • Opcode Fuzzy Hash: 34396bf3e71e6db16ef800dbe07c633deb27e43828bb614437cc9c954da12bf6
      • Instruction Fuzzy Hash: 03C2AE72B09B8386EB148F25D5A0AA977A0FB88B88F404131DF6D4B7E8DF78E515C744
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: AIFC$AIFF$COMM$FORM$INST$MARK$NONE$SSND$sowt
      • API String ID: 0-2989557625
      • Opcode ID: 10ff42e44650b91494c15b9c0dba512ddd4579f179e11e0107f30aa56282d26d
      • Instruction ID: 2333bc87c655019a3bec7acd85f5843c24b2d3880489cd10ac138c6b142f4a1b
      • Opcode Fuzzy Hash: 10ff42e44650b91494c15b9c0dba512ddd4579f179e11e0107f30aa56282d26d
      • Instruction Fuzzy Hash: CD128EB2B0A64385E764AB25D460BBD37A0EB84B4DF144035DE5D8BBE9EF38D545C700
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: Extended Module: $FMOD XM Target Unit$Number of channels$OggS$Sample name %d$c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\src\fmod_codec_xm.cpp
      • API String ID: 0-549889872
      • Opcode ID: 791dedb79cca9ce3c3f1084102afe6b3db24978cbac3691ec7b095a64a8f1e32
      • Instruction ID: 9badf58d86e1386386b6bf7dd03776908969604fa70093303f41c1bb77f63a0f
      • Opcode Fuzzy Hash: 791dedb79cca9ce3c3f1084102afe6b3db24978cbac3691ec7b095a64a8f1e32
      • Instruction Fuzzy Hash: 1BC28F72B0978796EB148F25D560BA977A0FB88B88F004031DB6D4B7E9EF38E551C744
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: SizeStream
      • String ID: $RIFF$WAVE$c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\src\fmod_codec_wav.cpp
      • API String ID: 3824195153-2801951558
      • Opcode ID: cfbe1c24a65985b6b690f48bbea250900f3ed98fa3b4ed02a7888aa7474fc9a1
      • Instruction ID: 9e34348e48991802d59ae218eaf36714acd61bfccc2e251145544789b413daa5
      • Opcode Fuzzy Hash: cfbe1c24a65985b6b690f48bbea250900f3ed98fa3b4ed02a7888aa7474fc9a1
      • Instruction Fuzzy Hash: 3632A172B0A74786E7648F15D4A4AB877E0FB84B48F14803ADA6D4B7E8EF38D841C754
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: acosf$cosfsinf
      • String ID:
      • API String ID: 2496649812-3916222277
      • Opcode ID: 82819643dd11e0dfcde0ba7265ab3b32bdb5b5456af99f9d49237e5f2df25701
      • Instruction ID: cfb47eeb75ec3846ea09dd48dab2555d00d4969213f9c7da5d115bfda4ebc283
      • Opcode Fuzzy Hash: 82819643dd11e0dfcde0ba7265ab3b32bdb5b5456af99f9d49237e5f2df25701
      • Instruction Fuzzy Hash: 3DE21973F1A78A85E751DB368051AB87360FF5D785F189732DA2D2A6F9DB38B0818700
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: TIT2$TITLE$TT2$c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\src\fmod_systemi_sound.cpp$c:\jk\workspace\build__1.10__api_win\lowlevel_api\src\fmod_autocleanup.h
      • API String ID: 0-539884770
      • Opcode ID: 30ceec38f9015aa733e978b281164e23b3481f028666eb24fcde0242d4c9d063
      • Instruction ID: 5ede8ab8b55f11104de9f0210c6434bd54140abbc30390e93db0e306c11c50b1
      • Opcode Fuzzy Hash: 30ceec38f9015aa733e978b281164e23b3481f028666eb24fcde0242d4c9d063
      • Instruction Fuzzy Hash: F6237036B0AB828AE794CF69D850AAD77A4FB48B88F144135DE5D5BBB8DF38D441C700
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: #EXTINF$#EXTM3U$FILE$LENGTH$TITLE
      • API String ID: 0-570215855
      • Opcode ID: 320861443544efde86ddace0ed1cd088f1d04035bc9983f30853cb44e84bbad1
      • Instruction ID: 76cc4024a1b9c896bbb2db316de21311cb38cd9bc87a9924879b39b2b0c71589
      • Opcode Fuzzy Hash: 320861443544efde86ddace0ed1cd088f1d04035bc9983f30853cb44e84bbad1
      • Instruction Fuzzy Hash: 56C1C031B0E28744EB269B299064BFAA7A1EF85744F440131DBBD4B6FDDF6CE4428709
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: powf
      • String ID: VUUU
      • API String ID: 3445610689-2040033107
      • Opcode ID: 2825d11ff34be5940086eef311fe2a08188b3986ca51961c634fbfdb2928f77c
      • Instruction ID: 3cfe88235a70a7633a4e207ff5e6d3b231a3b258e32685683d6e3aaa1f784d67
      • Opcode Fuzzy Hash: 2825d11ff34be5940086eef311fe2a08188b3986ca51961c634fbfdb2928f77c
      • Instruction Fuzzy Hash: D332F4B27096DA86E365DB35D054BB977A0FF59385F084235DBA817AE6CB38F064C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: logf
      • String ID:
      • API String ID: 2639405751-0
      • Opcode ID: beb92f6b535cacae8770d5347912aaa084f6efa4fbb70cd1776aeeee4b8b64f1
      • Instruction ID: 8894dd6a36ab1baada1fef0b1e3721549dbb6619f3768620274e17d52e9129d8
      • Opcode Fuzzy Hash: beb92f6b535cacae8770d5347912aaa084f6efa4fbb70cd1776aeeee4b8b64f1
      • Instruction Fuzzy Hash: 96B2F2B270D7D686E7658B29D060BB97BA0FB45785F084136DBA917AE5CB3CF064CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: Stream$Header$ConvertPrepareUnprepare
      • String ID:
      • API String ID: 293062188-0
      • Opcode ID: fdc392af58687cda18d8cd413c16d3d35cf9dd5d7ab56809dec54a52d87774d3
      • Instruction ID: 168885e387e1f778bc0d1347a1309080179d18e3be739fced9ac9ee724756e28
      • Opcode Fuzzy Hash: fdc392af58687cda18d8cd413c16d3d35cf9dd5d7ab56809dec54a52d87774d3
      • Instruction Fuzzy Hash: 87E1A132B1A68786EB68CB29C160FB97391FB44754F448135DA6D4BBE8DF38E851CB04
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: 3$7$?
      • API String ID: 0-1767453356
      • Opcode ID: e76724c2a447c271db411366409fe53f2e311d832648078c42f792e4db15865b
      • Instruction ID: 943bab2eb8d69fc5260658575817c99e2fdb6109376eade477857fd4174c9fee
      • Opcode Fuzzy Hash: e76724c2a447c271db411366409fe53f2e311d832648078c42f792e4db15865b
      • Instruction Fuzzy Hash: 35020432B1974686E721CB16E4A0679B260FF99784F184336DAAD56BF8DB3CE441CF00
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: RIFF$WAVE$c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\src\fmod_codec_mpeg.cpp
      • API String ID: 0-212751826
      • Opcode ID: 22eefa120e6ac3812d7df324be3fa7ede0d4f61a1702b0637f71bfeb3a45f66c
      • Instruction ID: 4bf28f70e70c1f9306136f498341679a5d73ed73768de61551b53b653aa26c81
      • Opcode Fuzzy Hash: 22eefa120e6ac3812d7df324be3fa7ede0d4f61a1702b0637f71bfeb3a45f66c
      • Instruction Fuzzy Hash: 1D226C7271A7838AE7609F25E864AE933A4FB88B48F544135DE6D4B7E8DF38D505CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: powf
      • String ID:
      • API String ID: 3445610689-0
      • Opcode ID: 603d62ab990437735766693c6872dc520f2df2760e8db12776a3dcee7f9f02aa
      • Instruction ID: b19a69295d7f2664e0fd164b8fb612bfaa814c4e4a89d8f48334bb807a14f0d9
      • Opcode Fuzzy Hash: 603d62ab990437735766693c6872dc520f2df2760e8db12776a3dcee7f9f02aa
      • Instruction Fuzzy Hash: CA62F762F2A28785E7169B21D064A79F7A0FF19B88F19C331DD546B2E8DF3DA4D0C610
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0c2bc416de3332f65fa119509545a8d2a6f26969bc9b6a78c4fc8614aff0dc6e
      • Instruction ID: c4c196ccc73e7928f2df80de53be3fe4ee25ae9df7d618d0d7a372e85c587316
      • Opcode Fuzzy Hash: 0c2bc416de3332f65fa119509545a8d2a6f26969bc9b6a78c4fc8614aff0dc6e
      • Instruction Fuzzy Hash: AA22E5A2B096DA86E7659B359051BB977A0FF45385F084236DBA8176E6CF3CF064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 82208018a9eb56528f63ea8002558d32b765005389a8d5140c6c311e32568397
      • Instruction ID: 95be0b92f8781a2928f623c85527eedfa26b7d1aa98564497179848d4b6048c5
      • Opcode Fuzzy Hash: 82208018a9eb56528f63ea8002558d32b765005389a8d5140c6c311e32568397
      • Instruction Fuzzy Hash: CB22F5A2B097D686E365DB35D051BB977A0FF59385F084236DBA817AE6CB38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 84bd7b23f321efafd22c65d8a6e57e47cdd5af560b18041bddfbbb2883dc800d
      • Instruction ID: 603e7d0768cf78811c284743045b112ea10687155979cb4961f245a464d53c95
      • Opcode Fuzzy Hash: 84bd7b23f321efafd22c65d8a6e57e47cdd5af560b18041bddfbbb2883dc800d
      • Instruction Fuzzy Hash: 0322F5A27096D686E365DB35D051BB977A0FF49385F084236DBA917AE6CB38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9c7c5b6750b0a946dd206f6e9a56139d076759615a2681e8b10382add957c258
      • Instruction ID: c860e0537be736fa2e577cea54475c3e61467e8552e9b40bba928498b526a23e
      • Opcode Fuzzy Hash: 9c7c5b6750b0a946dd206f6e9a56139d076759615a2681e8b10382add957c258
      • Instruction Fuzzy Hash: 2C22E5A2B097D686E765DB35D051BB977A0FF49385F084236DBA817AE6CB38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 742aa2a86e1fc8e1f6cf52df5dd477325c3d32edf911eae3f11e79a1ab62a4f6
      • Instruction ID: fecffb468b225da52db3c3f6f0ca959738b995e43f8cfbe87bc587e78bc230b0
      • Opcode Fuzzy Hash: 742aa2a86e1fc8e1f6cf52df5dd477325c3d32edf911eae3f11e79a1ab62a4f6
      • Instruction Fuzzy Hash: 7022E6A2B096D686E765DB35D061BB977A0FF49385F084235DBA817AE6CF38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6c3917960390b3c429497f5551053bc5c1a0c2e6ade36305ec3f4fade2a26165
      • Instruction ID: 5c6fe56c8b6f8978e8a2dd0cd574887edbabce4f32158d0d98981dd94bfc09e4
      • Opcode Fuzzy Hash: 6c3917960390b3c429497f5551053bc5c1a0c2e6ade36305ec3f4fade2a26165
      • Instruction Fuzzy Hash: C822E6A27096DA86E765DB35D061BB977A0FF49385F084235DBA817AE6CF38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: af6300c78d533e74629876d859bd8bf90dfb7290e589f7b5e69232bda8f8d866
      • Instruction ID: 57feed202950e1992f548ee3c34e5d5db6018bb19eed5dd645fa9259735500cf
      • Opcode Fuzzy Hash: af6300c78d533e74629876d859bd8bf90dfb7290e589f7b5e69232bda8f8d866
      • Instruction Fuzzy Hash: 2B22F4A2B096D686E3659B35D051BB977A0FF49385F084236DBA917AE6CF3CF064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 75c208fc805ee05bfdefce67e26f7e8cc49b79c9e105b51f6a93957282d7a39d
      • Instruction ID: d1ca021c32ac9582db6622311ef2abd27094930539af71adf8d719beee8705eb
      • Opcode Fuzzy Hash: 75c208fc805ee05bfdefce67e26f7e8cc49b79c9e105b51f6a93957282d7a39d
      • Instruction Fuzzy Hash: 0022F4A27097DA86E765DB35D060BB977A0FF49385F084235DBA917AE6CB38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 675bd5c7066a058e8b5010d1767f6d4f7e64006561e4a3251b836dd8be0fa413
      • Instruction ID: 2ee0a0489e45604ef6d7aef6be344223abfa3ef4d0560e5035f71b39d654031a
      • Opcode Fuzzy Hash: 675bd5c7066a058e8b5010d1767f6d4f7e64006561e4a3251b836dd8be0fa413
      • Instruction Fuzzy Hash: 8A22F6A27097DA86E765DB35D051BB977A0FF49385F084235DBA817AE6CB38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4fbf8ebf9c8c00007e5680ab9629560ac6fcd46b692e139c328dfdf50b9d8699
      • Instruction ID: c3dbe1b6dfe4768d4c14fd6158ce42d87a01c5af704748fe513a43398ddbf47b
      • Opcode Fuzzy Hash: 4fbf8ebf9c8c00007e5680ab9629560ac6fcd46b692e139c328dfdf50b9d8699
      • Instruction Fuzzy Hash: F622F5A27097DA86E365DB35D050BB977A0FF49385F084235DBA917AE6CB38F064CB00
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d04d14819ed0188e81b383a02781408865f074094eacdf81b78b13c48f57e102
      • Instruction ID: fee30ac7277fa3144274df657f0c16fb1ab3db79b543f590afa50ee17b7816c7
      • Opcode Fuzzy Hash: d04d14819ed0188e81b383a02781408865f074094eacdf81b78b13c48f57e102
      • Instruction Fuzzy Hash: AF22E3A27096DA86E3659B35D051BB977A0FF49385F084235DBA917AE6CF38F064C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: powf
      • String ID:
      • API String ID: 3445610689-0
      • Opcode ID: 06dddc037b30bd2783a2a696fe1c4a63d82cef08e3897184bde4a1266ecd4439
      • Instruction ID: e6b2583f0b10248fe825d36d62a0450bd3e49fc1a6be018894c097a31ad62448
      • Opcode Fuzzy Hash: 06dddc037b30bd2783a2a696fe1c4a63d82cef08e3897184bde4a1266ecd4439
      • Instruction Fuzzy Hash: FA22E3A27097DA86E765DB35D061BB977A0FF49385F084235DBA817AE6CB38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 96511e3df77955142db902f0a5e64e166403af174aa4dd3caceac293556c9233
      • Instruction ID: c70acfa06471d65c2171904752b90d60fbcb328606f61d1084201209b04f0690
      • Opcode Fuzzy Hash: 96511e3df77955142db902f0a5e64e166403af174aa4dd3caceac293556c9233
      • Instruction Fuzzy Hash: E622E4A27097DA86E766DB35D051BB977A0FF49385F084235DBA817AE6CB38F064C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7c0fda10f6b3404aa4f593de63f9cfd695ed00d4b45aae7c0af52891649a31c5
      • Instruction ID: 09474cadf67318a125e84eaf5ede823abd2b280910f209e1a1d107d619d0b6f3
      • Opcode Fuzzy Hash: 7c0fda10f6b3404aa4f593de63f9cfd695ed00d4b45aae7c0af52891649a31c5
      • Instruction Fuzzy Hash: 3F12F3A27097DA86E766DB35D051BB977A0FF49385F084235DBA817AE6CB38F064C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: ldexp
      • String ID:
      • API String ID: 3613099532-0
      • Opcode ID: 4abeb2b36b42efec222115914739e2d42a4951f3277572c4af600d57cd9fbc00
      • Instruction ID: bededda1f2b3adb09d9dcc2c6091d61df0372867e333ce5200ebebac985eb160
      • Opcode Fuzzy Hash: 4abeb2b36b42efec222115914739e2d42a4951f3277572c4af600d57cd9fbc00
      • Instruction Fuzzy Hash: 47715C32F1664686E7168B35A011A797A51FF99B84F14D331EA196ABF8EF3CF481C600
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: DSPI::RunJob
      • API String ID: 0-3985526273
      • Opcode ID: 876913066870ef64319db427a25033426fe5b110ac78b4893f4953d8bb2a6685
      • Instruction ID: aa169ae8f76abec0604d79d1eef318ed872f6f2626ba47ddcbe817c3e08ab86b
      • Opcode Fuzzy Hash: 876913066870ef64319db427a25033426fe5b110ac78b4893f4953d8bb2a6685
      • Instruction Fuzzy Hash: 08A26932B09782CAE7688F26D450BAA77A0FB48789F140135DB6D57BB8DF38E554DB00
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\src\fmod_systemi_sound.cpp
      • API String ID: 0-1303962717
      • Opcode ID: 76073fb90c69e8553430b6b0a8f36706bd938cbcc5a74feb80557fcd8ce498fd
      • Instruction ID: 990108f3e1520e93a7817164dd140dab7892764c6835eb5be9077fb3fcbafa01
      • Opcode Fuzzy Hash: 76073fb90c69e8553430b6b0a8f36706bd938cbcc5a74feb80557fcd8ce498fd
      • Instruction Fuzzy Hash: 87325E36B1AB428AEB908F65D450AAD73A5FB88B48F044135EE5D8B7F8DE38D851C740
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2a6ea687430f7c7713686cd7dcecb979266e7cf2bb0bb6452a6392b50ba2276f
      • Instruction ID: c3c2fc3515f891b30c456cc154d7447161a856357ab7a06202cfb45ef97f6da4
      • Opcode Fuzzy Hash: 2a6ea687430f7c7713686cd7dcecb979266e7cf2bb0bb6452a6392b50ba2276f
      • Instruction Fuzzy Hash: 2592E272B15A468AE710CF69D454AAC37B1FB98748F114235CE2D9BBA8EF39E406C740
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 76c7b8e2df87d55b3ad733cd26bb4e6b739fe688364ca9c773bc3c24be45074a
      • Instruction ID: 16e96fc4126d5a06f748b884b623a394a6d659a7e69044c900dafe91c3215b0c
      • Opcode Fuzzy Hash: 76c7b8e2df87d55b3ad733cd26bb4e6b739fe688364ca9c773bc3c24be45074a
      • Instruction Fuzzy Hash: 7AA2A221E39F87C8E633077998316B9AB58AFBB6CAF45D327F95830874AB1971C75100
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4082454c0727affa3dd5e78c43b4a110d33d012808a493bd8ab5d960d3df409c
      • Instruction ID: 3377437e2d5941040e2c877906885091448550bd17eb44bd6586aa4bd1f5fe94
      • Opcode Fuzzy Hash: 4082454c0727affa3dd5e78c43b4a110d33d012808a493bd8ab5d960d3df409c
      • Instruction Fuzzy Hash: FDA2F121F3AFCB49E633073998216B5A758AFAB6C9F44D327E959308B5BF1971C34204
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ed00b5f4eef8bd3fe57fb98244986c3dc48656aa9e50693be0482e1762bc23e3
      • Instruction ID: 0cc9d4c061b26aef7905b43266f85e8dceda80669c1ee02a73eb558bfe656ffd
      • Opcode Fuzzy Hash: ed00b5f4eef8bd3fe57fb98244986c3dc48656aa9e50693be0482e1762bc23e3
      • Instruction Fuzzy Hash: E482F972F2E78586D712CF359050B78B760EF59381F198323EA59636F9EB2CA584DB00
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d344dcd6a13d04e6acab2d293fbb31a59b9801abdd09900aa9281460f07579bf
      • Instruction ID: a370246bc91f37a6f3b7daf2eb7796f763699bd86c446330efae966a711db8fa
      • Opcode Fuzzy Hash: d344dcd6a13d04e6acab2d293fbb31a59b9801abdd09900aa9281460f07579bf
      • Instruction Fuzzy Hash: 4452CF73715AC98ACB50CF3AC48466CB760FB48B88F588726CB1D577A4EB35E559CB00
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: cfc7917bbbf1bee5a235a10183fb990b9d49ecdfbf07b39816ad50643338822c
      • Instruction ID: cc8af5179f37eb8bcdedd115a547d30f602d8e5488fecd9b9b2d2a64516b3d17
      • Opcode Fuzzy Hash: cfc7917bbbf1bee5a235a10183fb990b9d49ecdfbf07b39816ad50643338822c
      • Instruction Fuzzy Hash: 550281BBF7906013D36D8B29F862F566952B7E035CB49F02CAE0792F08E53DDA025B44
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 98bca517ad8a63d13b74febd005165f87a1193c3a762197933f8bc731be367ed
      • Instruction ID: 59d522891f5bfb936d868448fa31e2110287d9ed546c13349dfb57c74ad3db5a
      • Opcode Fuzzy Hash: 98bca517ad8a63d13b74febd005165f87a1193c3a762197933f8bc731be367ed
      • Instruction Fuzzy Hash: CA32D662B0E79742EB649A219560FBA7655AF44B84F2D4031DE6D0BFFDDF2DE4809300
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 36f4090b224c4f866230c2df80f2bf206acdee6eea0dd1b1c3d3f085061bbd1d
      • Instruction ID: badd8859eb9ff516722972bd6258518ce12835b44a8794b0691526094021d62d
      • Opcode Fuzzy Hash: 36f4090b224c4f866230c2df80f2bf206acdee6eea0dd1b1c3d3f085061bbd1d
      • Instruction Fuzzy Hash: C832AD72B06B868ADB948F19D454A6873A6F744FE8F148235DA3D077E8DF38D595C300
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 14205471b3dba9883ebd83ff3ae2e90359fa3c404fb620072c92ad914644ba98
      • Instruction ID: 8913ed2d7ed265be3bee646720ef97d4f82f441b39afde0367572bb64292f166
      • Opcode Fuzzy Hash: 14205471b3dba9883ebd83ff3ae2e90359fa3c404fb620072c92ad914644ba98
      • Instruction Fuzzy Hash: DA42F972B057868BD7248F259094ABD77A5FB98788F084236EA9D537F8DF38E441CB00
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9c33ba48b3c8f0146c9749c70c21a7586116c0540327425f5421e230e34aebd8
      • Instruction ID: 7756e446123f4d845aaedb68c5be2010011094a0121af6fb71f0f7ad91175a9b
      • Opcode Fuzzy Hash: 9c33ba48b3c8f0146c9749c70c21a7586116c0540327425f5421e230e34aebd8
      • Instruction Fuzzy Hash: E1123463715AA281E718CF29C4606BE37A6FB84F95F058235DA2E8B7E9DE3CD441C740
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8360bec3297c598c77761cb7a3df6d2a59792f3c71027902aac50d0ce9773b9c
      • Instruction ID: 9a89c88edebc100f3063a080c0f93584877b180feb320c4cae51677b937e77f0
      • Opcode Fuzzy Hash: 8360bec3297c598c77761cb7a3df6d2a59792f3c71027902aac50d0ce9773b9c
      • Instruction Fuzzy Hash: 7B02F772715A9286EB58CF29D460AB937E1FB84B84F109235DA6E87BD9EF38D540C340
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a7e77214501566145f63cb4bc1086d55029fc0c351e4a7450c32c69a86a91035
      • Instruction ID: fe8104e303ac010276f069b964a84db82c502ddd72001a6fd621534e9c79d511
      • Opcode Fuzzy Hash: a7e77214501566145f63cb4bc1086d55029fc0c351e4a7450c32c69a86a91035
      • Instruction Fuzzy Hash: 1E12D6727066D68ADB14CF25C450AAD7BB4FB44B98B058235EA2E4BBEDCB38D541CB00
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 81e34df38e05280a22c434c2cdb160b15bc6a71a9f66a0f4a1c3002e75b9a775
      • Instruction ID: 24b5b1ff2d4e7b2f8e4c2a80c93b0505df9d66b0d949b431081bec778684749c
      • Opcode Fuzzy Hash: 81e34df38e05280a22c434c2cdb160b15bc6a71a9f66a0f4a1c3002e75b9a775
      • Instruction Fuzzy Hash: 0C12D423D1DB8E82E263963740425B9B250AF7E395F1CE723FDA8354FADB2971D19600
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 60bf13f2ee62fcd3eaadc2694a29cfd57ef3985d581a9f4143079b99e2e36ac9
      • Instruction ID: f70f0d1f401d5681c351bc6a7a180fa516d741a07365ccd07cd2e9f552b0d33c
      • Opcode Fuzzy Hash: 60bf13f2ee62fcd3eaadc2694a29cfd57ef3985d581a9f4143079b99e2e36ac9
      • Instruction Fuzzy Hash: 95125E72B0AB428ADFA8DB01D474A7873A6FB54B90F158635CA6E476F8DF38D591C300
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 58d88e4252c362f637a31b63fde1bbaa2037665e6f16d1b2cdc8a8559beb5392
      • Instruction ID: 047cfc6d2da02912aaa1c902f79341d7aeee7c206b9d917c16b22b862ff058f6
      • Opcode Fuzzy Hash: 58d88e4252c362f637a31b63fde1bbaa2037665e6f16d1b2cdc8a8559beb5392
      • Instruction Fuzzy Hash: 90F1A772B0AA4346F765AF259410BB963A1FF84B4DF188135CE2D5BBECDE39A851C340
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2640140599f7363c4656523df08341b0d1a213ffd2810d9886f8f2855c406f7c
      • Instruction ID: d5558e4d4a0e46a050d8690a19f2a7b0a2d7c253e01e3a37b217d05586210392
      • Opcode Fuzzy Hash: 2640140599f7363c4656523df08341b0d1a213ffd2810d9886f8f2855c406f7c
      • Instruction Fuzzy Hash: 4802CC32A157CA85D316CF3794916B97360FFAD788F1D8736EE59366B8EB3470848A00
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 92b84cf95e5bd186fe532102f04283fc178b8dfa6e7e3ee278990402a7b19b38
      • Instruction ID: 3a2d16e703320b8c328cf33c450691dac0607e4d270bde299f3d92f0d23fda3a
      • Opcode Fuzzy Hash: 92b84cf95e5bd186fe532102f04283fc178b8dfa6e7e3ee278990402a7b19b38
      • Instruction Fuzzy Hash: FFE1AD73B06B068AEF54CF19D464A7833A6FB54B90B168635CA6E477E8EF38D950C340
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 50360452963b5de9da667b5e939b62d613b7168ec173bc331414ba1b8109aa8b
      • Instruction ID: 486f6432a8756a6531b50414de0e8ec8721dc8a6aa9f6b98b8bdef7041a9fda6
      • Opcode Fuzzy Hash: 50360452963b5de9da667b5e939b62d613b7168ec173bc331414ba1b8109aa8b
      • Instruction Fuzzy Hash: A0E1B033B0968287E7548E398465BF937E0F785B49F181036DE599BBE9CA3CD446CB10
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c0052bdc36b7e08618c6ed319b401b02119587354ca2002dd223555da54c194b
      • Instruction ID: c27a0653b6341d4446a30297713dcfebaa87564a4ef99ba185bd6f56f18d5215
      • Opcode Fuzzy Hash: c0052bdc36b7e08618c6ed319b401b02119587354ca2002dd223555da54c194b
      • Instruction Fuzzy Hash: 4CF16172B0A78281EB608B25E460BBA77A4FF94B88F445136DA9D47BB9DF3DD441C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 421b8e4a63e3c2985c1b15d53649d8a3f813eb4f77d1cde1ee87d6b559a65845
      • Instruction ID: 85bcb77943be4181e101dde310b67ca3ff357163bd0c510f43f6cd8d383767ab
      • Opcode Fuzzy Hash: 421b8e4a63e3c2985c1b15d53649d8a3f813eb4f77d1cde1ee87d6b559a65845
      • Instruction Fuzzy Hash: FFD11972B157E68AD750CB298458FBD7BE5E798705F4A8031DE5CCA2E9EA38E805C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8ff0fc19001ab3277522f4aaba5dd68e6e4c0c0bc1b9c7e68fa504abf9bdf2ee
      • Instruction ID: bccb1ce3778b5b5a8f78f16f858fd5246f138bd53df4c91d21b79a2671c9ac74
      • Opcode Fuzzy Hash: 8ff0fc19001ab3277522f4aaba5dd68e6e4c0c0bc1b9c7e68fa504abf9bdf2ee
      • Instruction Fuzzy Hash: 5BD1C372B0A7C785EB64CB15D420B796BA5FB84B84F554032DE6D4B7A8EF78E881C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a6c5e9e8247107a8f69741276f192ffefe4fd2059155018417f68992ac7d277a
      • Instruction ID: 8bb95165b102d3a1a07cba317a92ddd71641f0c90be0e1129f16ad4eba4119a5
      • Opcode Fuzzy Hash: a6c5e9e8247107a8f69741276f192ffefe4fd2059155018417f68992ac7d277a
      • Instruction Fuzzy Hash: 43C1A3B3B06B068ADFA4DF08D4A496833A6F754B90B14463ACA6D477F8EF38D595C340
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: cd5e7ed624cb2219dbf1d70f577e18315508d2c69917a5eb3606f2fc6b21c963
      • Instruction ID: a5ec0d0d981a736d6ba78009a7b59def067641fb4a15c761bebbc8f3f47a9b07
      • Opcode Fuzzy Hash: cd5e7ed624cb2219dbf1d70f577e18315508d2c69917a5eb3606f2fc6b21c963
      • Instruction Fuzzy Hash: B1D13CB2A0A6C686E7588F19D1616BC77E0F749B48F0D863ACB1D4B7A4CF39D491CB04
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 13c3bde76acb3736ef0ff612c0d6adf406b4aed2f0b09db09e6a97cbf888dc6f
      • Instruction ID: a42f8e5871d55c05a45095894e9f770f520bb362329e54e5615faf5f8e507b61
      • Opcode Fuzzy Hash: 13c3bde76acb3736ef0ff612c0d6adf406b4aed2f0b09db09e6a97cbf888dc6f
      • Instruction Fuzzy Hash: 2B91E733B1959747E7288E29982097D7A42FBD1B90F198235DE2A5BBDCED3CEC018740
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 681e3d5c03eb367c104cf872dcb0a6695357eabbff306f8f6661968261a30609
      • Instruction ID: fbe5b7bf2317b7c5eaa45005c37837e2976e4bccd7efa49bccfaf4c824125ce4
      • Opcode Fuzzy Hash: 681e3d5c03eb367c104cf872dcb0a6695357eabbff306f8f6661968261a30609
      • Instruction Fuzzy Hash: B2A12967F1958745F358AA35C820BB8BAD1EB9474AF08C035DA998BBDDDE3CD901D320
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 399f277cd4337b2c602c5986fabedce5bea8ad0c8b8a5e30310703ebdd44c411
      • Instruction ID: 85de916324677505fe9837b87a70dd8cc88e1a3b00740060bbeaab8eb47206c8
      • Opcode Fuzzy Hash: 399f277cd4337b2c602c5986fabedce5bea8ad0c8b8a5e30310703ebdd44c411
      • Instruction Fuzzy Hash: C4A1C121B0A783C1E7619A25A161BBBB6A5EF84B85F090430DEAD47BFEDF3CE5414700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d22166d5c86ea43263a5e0a65ab1ae8215da1bb67d7150aa50c074726821f379
      • Instruction ID: 3c5a29e229877977f76a49187fb2bbad2ee7ff07ac50112a823c480360a6f152
      • Opcode Fuzzy Hash: d22166d5c86ea43263a5e0a65ab1ae8215da1bb67d7150aa50c074726821f379
      • Instruction Fuzzy Hash: F4B18372B0968386E720DB15E460AB977A4FB88788F504135DE5D4BAE8DFB8E945CB00
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 46daec79f54276f1b806b760ae7d016b40c142a218972c29daee7f2bbe8d2ebd
      • Instruction ID: cc74d5adf4ad8d5eb3c0a34ac043aa2ee2ffd706e3afef5ec2fb0d74808eae53
      • Opcode Fuzzy Hash: 46daec79f54276f1b806b760ae7d016b40c142a218972c29daee7f2bbe8d2ebd
      • Instruction Fuzzy Hash: D1A1A332B15F4287E768CB19D55152DB3E1F748B81B248139EB8E87BA8DF38E451C740
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e4703363641bbe34021fc2e6e0ae25680562b19fc38599b204303858eb9551d1
      • Instruction ID: fee9f6451005a462ef1776596e5399c891a44a2fd2f7a3c5c3a5316dde84e1c0
      • Opcode Fuzzy Hash: e4703363641bbe34021fc2e6e0ae25680562b19fc38599b204303858eb9551d1
      • Instruction Fuzzy Hash: 6EB16062B0AA8381EB20DF25D4206A96B91FBC4B94F544635EA7D8B6FDFF38D544C700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 622a4bc1415c1ee73694e3ddd3a4366bb1608c10af576fc6c4d71e965b1686ab
      • Instruction ID: ef7bc1d63accb87fc6c5551e20877f794d859a41b771e2d61e7460daa57185b4
      • Opcode Fuzzy Hash: 622a4bc1415c1ee73694e3ddd3a4366bb1608c10af576fc6c4d71e965b1686ab
      • Instruction Fuzzy Hash: D9916D72706B8682EB649F35E460BA933A4EB88B98F184535CE6D47BF8DF78D451C340
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 56390383fd93d6b0430b4d99a4e429147a23f730a0669ba082a58bcb8b259100
      • Instruction ID: 4002f2b2198a0e7c9f6ab5bd8cd0c58cc4728e22796e509b05cf88b379548155
      • Opcode Fuzzy Hash: 56390383fd93d6b0430b4d99a4e429147a23f730a0669ba082a58bcb8b259100
      • Instruction Fuzzy Hash: A7919D73B05B8286DB58CF01E464BA833A5F794B94F50923ADA6E87BE8DF38C554C740
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6f17500053de06a743ab9e8f6764b19d7bc9787b0aaf10cfa9132233d25ba30f
      • Instruction ID: 3bab28c37acbd148eca34afab2dc2dbae1227f314e464a1aeea49d08c3e8289c
      • Opcode Fuzzy Hash: 6f17500053de06a743ab9e8f6764b19d7bc9787b0aaf10cfa9132233d25ba30f
      • Instruction Fuzzy Hash: 39719632B0A78746E7648E259464B797791FB84B98F1C813AEDAD47BF8DF38D8418700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 699a0cf4435607929d0abca0ff247e8b446887c4d371393512bbeddc1d3e09c3
      • Instruction ID: 4d011819b602c43531eef0e4c661bd9e16bd1b369b23ebc9741778d5a4907b91
      • Opcode Fuzzy Hash: 699a0cf4435607929d0abca0ff247e8b446887c4d371393512bbeddc1d3e09c3
      • Instruction Fuzzy Hash: 25710273B0AB078AEF54CF08D464AA833A6F758B90B164636DA6E477E8DF38D445C340
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0813264c870c48259489f205b955c66b84c0e5c4bc1c460f3117f9b8472cb16c
      • Instruction ID: 45da2b8e33aacfa7a5214105076d148361049b5f80c8dda04f53d98543c1e57c
      • Opcode Fuzzy Hash: 0813264c870c48259489f205b955c66b84c0e5c4bc1c460f3117f9b8472cb16c
      • Instruction Fuzzy Hash: 79812B73A1E6D785E7658F25C020B7D7BA1EB49748F184135CA9A0B2ECCFBDD5448B01
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3938101d2e471721300ea90902f119128b40a81bb4622b7adcd202d6bb6134cb
      • Instruction ID: 17ba53d55e76769c0f574d0d562414a8731d09f292cf075c17ebde5054dde578
      • Opcode Fuzzy Hash: 3938101d2e471721300ea90902f119128b40a81bb4622b7adcd202d6bb6134cb
      • Instruction Fuzzy Hash: B781A272B1969382E725AB25D460BFE73A1FB88784F404031DF6D4B69ADF38E111CB40
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dc4f31345ea56c621598d47ca2ae2aed23e26b7171144c763e984ada77b5e69d
      • Instruction ID: 11cdd7502ba253584283ad2a6b363f8330d10514fe2687acad5e56fc8edbc2e8
      • Opcode Fuzzy Hash: dc4f31345ea56c621598d47ca2ae2aed23e26b7171144c763e984ada77b5e69d
      • Instruction Fuzzy Hash: 41515732B0A99382E714CA6AD860A7E7B91FBC5744F158135CA2E877E8FE3CE001D740
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7dd9d9fe31993f13fbfdefe720b18fb19482d7e8eae9b46b868103a58347ee4e
      • Instruction ID: 04055d82e52ffecc6e8bd2c662db53854f179fbf377f98b80e61db25865431ee
      • Opcode Fuzzy Hash: 7dd9d9fe31993f13fbfdefe720b18fb19482d7e8eae9b46b868103a58347ee4e
      • Instruction Fuzzy Hash: 5161B732B1E54742EB648B2A9060E3D6391FB84764F598134DAAD5FBEDDE2DEC01C708
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fc23818caec86845101dad39f819b7d741e9fcb9fb28c55d368db2b6fcabaaa1
      • Instruction ID: 39b880cfd494bbe1b0d892f19b003f0bed3c0fb7b1abd950e70b8898602316ed
      • Opcode Fuzzy Hash: fc23818caec86845101dad39f819b7d741e9fcb9fb28c55d368db2b6fcabaaa1
      • Instruction Fuzzy Hash: 9E614D32B1928747E7198A36D1A4E78B791AF9D780F148335DB295BAE9DF2CF4508700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3eacf47beca012f95577d3473ae261e3e7ce24aa5fb7cea910b23cd669ddb356
      • Instruction ID: 414edc448c74119438fc61028a8fec4abc22a2fd8ce8a89bc8f2949bf4861cc1
      • Opcode Fuzzy Hash: 3eacf47beca012f95577d3473ae261e3e7ce24aa5fb7cea910b23cd669ddb356
      • Instruction Fuzzy Hash: 3351AF23B2965106F745C73ADC5176D76E1EF86BC0F08C336DA1AD3A99EF28E1528700
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bda8c3c3e9c00f9f01f8bff0b18808f5481ac799976d89bdb50ba71537f9758e
      • Instruction ID: 5b0e2fde47dddce01936b231e8d61f529f931fac3e18a84ca4d02b802a1b93e2
      • Opcode Fuzzy Hash: bda8c3c3e9c00f9f01f8bff0b18808f5481ac799976d89bdb50ba71537f9758e
      • Instruction Fuzzy Hash: DC61C17271A6C286EB248F18E055BA97B90FB84748F444039CB6D5BBDDEE3CE541CB00
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e9a2de2f3f21e9c1449d2ac43d7bd91508e94e02089e4d821bd199b2e19e556d
      • Instruction ID: 011fa1c6623f49f6481dbbd097dd359191492cf4e162d6764dff5c9fefc6cb1f
      • Opcode Fuzzy Hash: e9a2de2f3f21e9c1449d2ac43d7bd91508e94e02089e4d821bd199b2e19e556d
      • Instruction Fuzzy Hash: F4510332B1B69786EB248B15A160F79BA90FF94784F408135CE2D4BFD8EE3CE8058740
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 51773e839a71dab05843d8841215fe45e2064fac29178e9a3c06ba784870b802
      • Instruction ID: ccc7abc797fc3f22a6f3007903d436db0b06b85c4cb22079e196f5029a3142f1
      • Opcode Fuzzy Hash: 51773e839a71dab05843d8841215fe45e2064fac29178e9a3c06ba784870b802
      • Instruction Fuzzy Hash: 8741C631B2B69347E77C8B259565F78A291FF88741F444039DA6D4BAE8DE3CF8108B04
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 202bb7424f2df49b6b4c0687619ce9043a37f241d8535bb25af38cb02faf25fb
      • Instruction ID: ced310493efb78862cf2a8a50c2f838c281825c6f033b511bcd8873848859f60
      • Opcode Fuzzy Hash: 202bb7424f2df49b6b4c0687619ce9043a37f241d8535bb25af38cb02faf25fb
      • Instruction Fuzzy Hash: 82410E33B1999386E7148A299C60E7D2A96EBC5740F198134DE1ACB7EDFD3DE4018340
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d4d7fb261c53d3a7cb0d401532d3962867f2dacb4e737c224af56f1f0579283d
      • Instruction ID: 0f9d5cc1d3f813b87ac87bc87ef6e8729f51be0d67f573ffddcee8fc0e12decf
      • Opcode Fuzzy Hash: d4d7fb261c53d3a7cb0d401532d3962867f2dacb4e737c224af56f1f0579283d
      • Instruction Fuzzy Hash: BA51CA22E2DB8E81D752C7375091474B370AFAE791F2DDB33E9A9325F5DB24B5814600
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 57404d0860faa1f76f9747a1aa45542b5e8179c9ce902e3db3907c74869081b2
      • Instruction ID: 6fb1f386b0082396c14ebc54b079e48b75dcea659b2d903051deb9467151bb49
      • Opcode Fuzzy Hash: 57404d0860faa1f76f9747a1aa45542b5e8179c9ce902e3db3907c74869081b2
      • Instruction Fuzzy Hash: 2E0165723210624BFFA88B298C35A3C26D0E38A782F45653EDE49C6BD4DA2DA501CB50

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 895 7ffdfb7d63c4-7ffdfb7d6406 896 7ffdfb7d6408-7ffdfb7d641a call 7ffdfb7c5e78 call 7ffdfb7c5ee8 895->896 897 7ffdfb7d641f-7ffdfb7d6430 call 7ffdfb7c2920 895->897 911 7ffdfb7d6744 call 7ffdfb7c8578 896->911 903 7ffdfb7d6449-7ffdfb7d644b 897->903 904 7ffdfb7d6432-7ffdfb7d6444 call 7ffdfb7c5e78 call 7ffdfb7c5ee8 897->904 905 7ffdfb7d6451-7ffdfb7d6457 903->905 906 7ffdfb7d6732-7ffdfb7d673e call 7ffdfb7c5e78 call 7ffdfb7c5ee8 903->906 919 7ffdfb7d6749 904->919 905->906 909 7ffdfb7d645d-7ffdfb7d648a 905->909 906->911 909->906 913 7ffdfb7d6490-7ffdfb7d64a2 call 7ffdfb7d8f50 909->913 911->919 924 7ffdfb7d64b4-7ffdfb7d64c5 GetFileType 913->924 925 7ffdfb7d64a4-7ffdfb7d64af call 7ffdfb7c5ee8 913->925 923 7ffdfb7d674c-7ffdfb7d6778 call 7ffdfb7c28f0 919->923 928 7ffdfb7d64cb-7ffdfb7d64d1 924->928 929 7ffdfb7d655f-7ffdfb7d6580 GetFileInformationByHandle 924->929 940 7ffdfb7d6724 925->940 934 7ffdfb7d64e9-7ffdfb7d64f1 928->934 935 7ffdfb7d64d3-7ffdfb7d64d5 928->935 931 7ffdfb7d6586-7ffdfb7d658f 929->931 932 7ffdfb7d64d7-7ffdfb7d64e4 GetLastError call 7ffdfb7c5e98 929->932 938 7ffdfb7d6598 931->938 939 7ffdfb7d6591-7ffdfb7d6596 931->939 932->940 936 7ffdfb7d64f8-7ffdfb7d651f 934->936 937 7ffdfb7d64f3 934->937 935->925 935->932 943 7ffdfb7d6529-7ffdfb7d655a PeekNamedPipe 936->943 944 7ffdfb7d6521-7ffdfb7d6524 936->944 937->936 945 7ffdfb7d659d-7ffdfb7d65a5 938->945 939->945 942 7ffdfb7d6727-7ffdfb7d6730 call 7ffdfb7d93b0 940->942 942->923 943->942 944->942 948 7ffdfb7d65a7-7ffdfb7d65ab 945->948 949 7ffdfb7d65b3-7ffdfb7d65c5 FileTimeToLocalFileTime 945->949 948->949 951 7ffdfb7d65ad-7ffdfb7d65b1 948->951 949->940 952 7ffdfb7d65cb-7ffdfb7d65dd FileTimeToSystemTime 949->952 953 7ffdfb7d661b-7ffdfb7d661f 951->953 952->940 954 7ffdfb7d65e3-7ffdfb7d6617 call 7ffdfb7d6888 952->954 955 7ffdfb7d6621-7ffdfb7d6625 953->955 956 7ffdfb7d662d-7ffdfb7d663f FileTimeToLocalFileTime 953->956 954->953 955->956 958 7ffdfb7d6627-7ffdfb7d662b 955->958 956->940 959 7ffdfb7d6645-7ffdfb7d6657 FileTimeToSystemTime 956->959 961 7ffdfb7d6691-7ffdfb7d6699 958->961 959->940 962 7ffdfb7d665d-7ffdfb7d668c call 7ffdfb7d6888 959->962 964 7ffdfb7d669b-7ffdfb7d669f 961->964 965 7ffdfb7d66a7-7ffdfb7d66b9 FileTimeToLocalFileTime 961->965 962->961 964->965 966 7ffdfb7d66a1-7ffdfb7d66a5 964->966 965->940 967 7ffdfb7d66bb-7ffdfb7d66cd FileTimeToSystemTime 965->967 968 7ffdfb7d6703-7ffdfb7d6722 966->968 967->940 969 7ffdfb7d66cf-7ffdfb7d66fe call 7ffdfb7d6888 967->969 968->942 969->968
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 388111225-0
      • Opcode ID: 5805c1ae12828bbeea95a7e3c5a80e0c847252bbb5f2cc44d9862bf3745f349c
      • Instruction ID: 1ac916f5e327d55ed37220f8e56fa66f58c4eb563c15893c86506c24e03ba701
      • Opcode Fuzzy Hash: 5805c1ae12828bbeea95a7e3c5a80e0c847252bbb5f2cc44d9862bf3745f349c
      • Instruction Fuzzy Hash: 2AB15A72B0975396E7609F15E86193AB7A1FB88790F504139E6A943AFCDF3CE464CB00

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _errno$__doserrno_getptd_noexit_invalid_parameter_noinfo$FullNamePath_getdrive_validdrive
      • String ID: .$:
      • API String ID: 3206601966-4202072812
      • Opcode ID: dda4af5bde86a55b325c719ad0d14d5f3f2e85d21bb35f2d9409b6855bd26b4b
      • Instruction ID: b198ecb31f6cab6bdf26639e5731b347a388290f35fefdd7dbce0cdeadf89b2b
      • Opcode Fuzzy Hash: dda4af5bde86a55b325c719ad0d14d5f3f2e85d21bb35f2d9409b6855bd26b4b
      • Instruction Fuzzy Hash: 1F317FA2B1E74386FF625F609821A7D72906F4C7C4F444034E92E5A2FEEE3CE9058711

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2640 7ffdfb7cc09c-7ffdfb7cc0c0 DecodePointer 2641 7ffdfb7cc0dc-7ffdfb7cc0f6 call 7ffdfb7c55b8 2640->2641 2642 7ffdfb7cc0c2-7ffdfb7cc0c8 2640->2642 2648 7ffdfb7cc0f8-7ffdfb7cc0fe 2641->2648 2649 7ffdfb7cc112-7ffdfb7cc151 call 7ffdfb7c55b8 * 3 2641->2649 2643 7ffdfb7cc0ca-7ffdfb7cc0d3 call 7ffdfb7c55b8 2642->2643 2644 7ffdfb7cc0d5 2642->2644 2643->2642 2643->2644 2644->2641 2651 7ffdfb7cc10b 2648->2651 2652 7ffdfb7cc100-7ffdfb7cc109 call 7ffdfb7c55b8 2648->2652 2661 7ffdfb7cc165-7ffdfb7cc17f EncodePointer 2649->2661 2662 7ffdfb7cc153-7ffdfb7cc15b 2649->2662 2651->2649 2652->2648 2652->2651 2663 7ffdfb7cc181-7ffdfb7cc186 call 7ffdfb7c55b8 2661->2663 2664 7ffdfb7cc18e-7ffdfb7cc198 2661->2664 2662->2661 2665 7ffdfb7cc15d-7ffdfb7cc160 call 7ffdfb7c55b8 2662->2665 2663->2664 2667 7ffdfb7cc19a-7ffdfb7cc19f call 7ffdfb7c55b8 2664->2667 2668 7ffdfb7cc1a7-7ffdfb7cc1b6 2664->2668 2665->2661 2667->2668 2672 7ffdfb7cc1d7-7ffdfb7cc1e1 2668->2672 2673 7ffdfb7cc1b8-7ffdfb7cc1c9 2668->2673 2673->2672 2675 7ffdfb7cc1cb-7ffdfb7cc1d0 call 7ffdfb7c55b8 2673->2675 2675->2672
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
      • String ID:
      • API String ID: 4099253644-0
      • Opcode ID: cf4d798ab351e78df53d692251e05e5482dec89a3a212b31f4242bedf1750c22
      • Instruction ID: 48809c52745d8ce8a239ed6e5f6bcc2d65b0de9e6b0d954817908d64d14576fa
      • Opcode Fuzzy Hash: cf4d798ab351e78df53d692251e05e5482dec89a3a212b31f4242bedf1750c22
      • Instruction Fuzzy Hash: 87313DA1F1BB0392FB549B21F875B7832A1AF85B50F085139C93D06AFECE2CE4808340

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2721 7ffdfb6e99d0-7ffdfb6e99fe 2722 7ffdfb6e9a08-7ffdfb6e9a13 2721->2722 2723 7ffdfb6e9a00-7ffdfb6e9a03 2721->2723 2725 7ffdfb6e9a3a 2722->2725 2726 7ffdfb6e9a15-7ffdfb6e9a17 2722->2726 2724 7ffdfb6e9b96-7ffdfb6e9bb0 call 7ffdfb7c28f0 2723->2724 2730 7ffdfb6e9a3f-7ffdfb6e9a5f call 7ffdfb7c52e0 2725->2730 2728 7ffdfb6e9a19-7ffdfb6e9a1b 2726->2728 2729 7ffdfb6e9a33-7ffdfb6e9a38 2726->2729 2733 7ffdfb6e9a2c-7ffdfb6e9a31 2728->2733 2734 7ffdfb6e9a1d-7ffdfb6e9a1f 2728->2734 2729->2730 2738 7ffdfb6e9a6b 2730->2738 2739 7ffdfb6e9a61-7ffdfb6e9a64 2730->2739 2733->2730 2736 7ffdfb6e9a25-7ffdfb6e9a2a 2734->2736 2737 7ffdfb6e9a21-7ffdfb6e9a23 2734->2737 2736->2730 2737->2730 2737->2736 2741 7ffdfb6e9a6d-7ffdfb6e9ace 2738->2741 2739->2738 2740 7ffdfb6e9a66-7ffdfb6e9a69 2739->2740 2740->2738 2740->2741 2742 7ffdfb6e9b09-7ffdfb6e9b94 call 7ffdfb7c54e4 * 5 2741->2742 2743 7ffdfb6e9ad0-7ffdfb6e9b06 2741->2743 2742->2724 2743->2742
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: fwrite$fseek
      • String ID: RIFF$WAVE$fmt dataRIFF
      • API String ID: 3883414211-669727819
      • Opcode ID: 4a58db390e0c350147679b17a6877f850bd56ed26d1ad645e210a60729b5f62a
      • Instruction ID: ba7d3c1f87c1264b77391d9df7adf02129169b6084c17b2c194dea870fc07de5
      • Opcode Fuzzy Hash: 4a58db390e0c350147679b17a6877f850bd56ed26d1ad645e210a60729b5f62a
      • Instruction Fuzzy Hash: D2519172F156138AFB50DBA9C851BAD33A1BF48308F548035DE1C9BBE9DE389946CB04

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
      • String ID:
      • API String ID: 1078912150-0
      • Opcode ID: d9e3faa8781b963d127ee6cabffdf646e7a81645105aceffb584fd15a491f447
      • Instruction ID: c271ec470d6d29ea8726ef2f9b48cab0e53d58f7b361dd2423dc21dbb5aab205
      • Opcode Fuzzy Hash: d9e3faa8781b963d127ee6cabffdf646e7a81645105aceffb584fd15a491f447
      • Instruction Fuzzy Hash: 1D21CF62B1E78355E3016B159862B7D7650AF847E0F454538EA3D0A6FACF7CA8458310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
      • String ID:
      • API String ID: 2644381645-0
      • Opcode ID: a0e9060e0624be55f51861cf2a2466c7cde2639377625ede96349cae0c3d369e
      • Instruction ID: c05799f1f3acb4e0cf52909680bae323c15885523ac77f0b40a436a1db25e9f7
      • Opcode Fuzzy Hash: a0e9060e0624be55f51861cf2a2466c7cde2639377625ede96349cae0c3d369e
      • Instruction Fuzzy Hash: 8021B062B1A74396E7016B259821B7D76506F94BF0F694238EE3D0A3FADF7CA4408710
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID:
      • String ID: ALBUM$ARTIST$COMMENT$GENRE$TITLE$TRACK$YEAR
      • API String ID: 0-884420406
      • Opcode ID: 8fec39663965d748d2b14ea4cc4789a4ebe5684eb335f0ad5483c9e7b51c1f9f
      • Instruction ID: 148ee33a60f78a34714cd8384e5b9e5b143922c70356e3f0a87436e302cab9d7
      • Opcode Fuzzy Hash: 8fec39663965d748d2b14ea4cc4789a4ebe5684eb335f0ad5483c9e7b51c1f9f
      • Instruction Fuzzy Hash: 07C12832B196528DEB50DBB0E8507ED3BB0BB48348F440136EA9DA7AADEF38D145C744
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
      • String ID:
      • API String ID: 2464146582-0
      • Opcode ID: c0d60725373e9c41c0598c34f57118b5657bb6d9104077c137164366f3da7e52
      • Instruction ID: 093d89442ce3f13e75fb1df5597bcba009268a06e49ed93dcf1bc5b1c8def6df
      • Opcode Fuzzy Hash: c0d60725373e9c41c0598c34f57118b5657bb6d9104077c137164366f3da7e52
      • Instruction Fuzzy Hash: CE21FF72B1E74356E3016B259862B7D7651AF84BE0F094138EA3D0B6FACF7DA4448310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _errno$BuffersErrorFileFlushLast__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
      • String ID:
      • API String ID: 2927645455-0
      • Opcode ID: 0155c1abd61115a5e5238ad0e6c3619ff1ce2ed7019004f7e96fe9224ab38616
      • Instruction ID: 51a01f565ce5e26f04ff7fb7030fa2821a5cfe6c8b8132070fa32b8aa9b927d0
      • Opcode Fuzzy Hash: 0155c1abd61115a5e5238ad0e6c3619ff1ce2ed7019004f7e96fe9224ab38616
      • Instruction Fuzzy Hash: BD218E62B1E74345E7116FA5D4B1A7E7650AF88790F594138DA3E0B2FBCF7CA8458304
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
      • String ID:
      • API String ID: 2140805544-0
      • Opcode ID: fbb99d3841884056ba07b063a9d788be12f9e794a8d4c1bcdcd76d4ac9059d04
      • Instruction ID: 919a113ca8f11fa3fa24f5b3b81dda5b7f95661c59c03b3124ded2c54df02b87
      • Opcode Fuzzy Hash: fbb99d3841884056ba07b063a9d788be12f9e794a8d4c1bcdcd76d4ac9059d04
      • Instruction Fuzzy Hash: 3211DE72B1E34356E3016B24A871E7C7650AF847A0F551138D93E4B2FACE7CE8448310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cosfsinf$logf
      • String ID:
      • API String ID: 3595282622-0
      • Opcode ID: 0306b9306831206599c90498e50d2235fd5329ee40022bd8796797b9796fe1f9
      • Instruction ID: 1f2f2b64674909a26dfb9201d2f71e1c1e21cfb259df3d3b58c2ecae218e1cec
      • Opcode Fuzzy Hash: 0306b9306831206599c90498e50d2235fd5329ee40022bd8796797b9796fe1f9
      • Instruction Fuzzy Hash: 4B810B22E15B8A55E3129B359401BFAB390BFAD344F19C731F959626B9EB38F581CB00
      APIs
      • _FF_MSGBANNER.LIBCMT ref: 00007FFDFB7CBC2D
        • Part of subcall function 00007FFDFB7D1A30: _set_error_mode.LIBCMT ref: 00007FFDFB7D1A39
        • Part of subcall function 00007FFDFB7D1A30: _set_error_mode.LIBCMT ref: 00007FFDFB7D1A48
        • Part of subcall function 00007FFDFB7D1A30: _NMSG_WRITE.LIBCMT ref: 00007FFDFB7D1A5F
        • Part of subcall function 00007FFDFB7D1A30: _NMSG_WRITE.LIBCMT ref: 00007FFDFB7D1A69
      • _NMSG_WRITE.LIBCMT ref: 00007FFDFB7CBC37
        • Part of subcall function 00007FFDFB7D1AA4: _set_error_mode.LIBCMT ref: 00007FFDFB7D1AE9
        • Part of subcall function 00007FFDFB7D1AA4: _set_error_mode.LIBCMT ref: 00007FFDFB7D1AFA
        • Part of subcall function 00007FFDFB7D1AA4: GetModuleFileNameW.KERNEL32 ref: 00007FFDFB7D1B5C
        • Part of subcall function 00007FFDFB7D1AA4: __crtMessageBoxW.LIBCMT ref: 00007FFDFB7D1C0D
        • Part of subcall function 00007FFDFB7CC084: __crtCorExitProcess.LIBCMT ref: 00007FFDFB7CC08C
        • Part of subcall function 00007FFDFB7CC084: ExitProcess.KERNEL32 ref: 00007FFDFB7CC093
      • _malloc_crt.LIBCMT ref: 00007FFDFB7CBC63
        • Part of subcall function 00007FFDFB7D22E8: malloc.LIBCMT ref: 00007FFDFB7D2313
        • Part of subcall function 00007FFDFB7D22E8: Sleep.KERNEL32(?,?,?,00007FFDFB7CBC68,?,?,?,00007FFDFB7CBB67,?,?,0000000D,00007FFDFB7D017F,?,?,00000000,00007FFDFB7D024A), ref: 00007FFDFB7D2326
      • _errno.LIBCMT ref: 00007FFDFB7CBC70
      • _lock.LIBCMT ref: 00007FFDFB7CBC84
      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,?,00007FFDFB7CBB67,?,?,0000000D,00007FFDFB7D017F,?,?,00000000,00007FFDFB7D024A,?,?,?,00007FFDFB7C7944), ref: 00007FFDFB7CBC99
      • free.LIBCMT ref: 00007FFDFB7CBCA5
        • Part of subcall function 00007FFDFB7C55B8: HeapFree.KERNEL32(?,?,00000000,00007FFDFB7D02DE,?,?,00000000,00007FFDFB7C5EF1,?,?,?,?,00007FFDFB7C5696,?,?,00000000), ref: 00007FFDFB7C55CE
        • Part of subcall function 00007FFDFB7C55B8: _errno.LIBCMT ref: 00007FFDFB7C55D8
        • Part of subcall function 00007FFDFB7C55B8: GetLastError.KERNEL32(?,?,00000000,00007FFDFB7D02DE,?,?,00000000,00007FFDFB7C5EF1,?,?,?,?,00007FFDFB7C5696,?,?,00000000), ref: 00007FFDFB7C55E0
      • LeaveCriticalSection.KERNEL32(?,?,?,00007FFDFB7CBB67,?,?,0000000D,00007FFDFB7D017F,?,?,00000000,00007FFDFB7D024A,?,?,?,00007FFDFB7C7944), ref: 00007FFDFB7CBCB2
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _set_error_mode$CriticalExitProcessSection__crt_errno$CountErrorFileFreeHeapInitializeLastLeaveMessageModuleNameSleepSpin_lock_malloc_crtfreemalloc
      • String ID:
      • API String ID: 3481093610-0
      • Opcode ID: c9b07db09193e9564490e07e0caf2788dd03c285885ab70628e9db66ff1ff910
      • Instruction ID: 60c9fe3aa3bec327544333fb7a44ead3b117281ba2ba22c9056e876a418d70c6
      • Opcode Fuzzy Hash: c9b07db09193e9564490e07e0caf2788dd03c285885ab70628e9db66ff1ff910
      • Instruction Fuzzy Hash: FD116AA0B2E74BA1F760AB60E565B7D3251EF84780F000038E96E46BFECE7CA4818310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: CriticalSection$_lock$CountEnterInitializeLeaveSpin__lock_fhandle_calloc_crt
      • String ID:
      • API String ID: 3307090481-0
      • Opcode ID: f68123b31c7b6df351fe40185634101800ddb0325711a765ed80b5c1163be89d
      • Instruction ID: c4887acd499fb16ca384bf30098860d95392cd275c79b8ccbb3efa5a8634f71a
      • Opcode Fuzzy Hash: f68123b31c7b6df351fe40185634101800ddb0325711a765ed80b5c1163be89d
      • Instruction Fuzzy Hash: 0951CE32B1A74782EB209B11E864639B6A5FF88B94F154135DA6D473F8DF3DE849C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _errnocalloc$_calloc_implfree
      • String ID:
      • API String ID: 3866454138-0
      • Opcode ID: d0a7d7fc86d4a434f4f961f875527448c970b76fe99bbb170c4fd03ab25f859f
      • Instruction ID: 91e1dd116e3c185750014d718d25ede640b0ebbd42e4ed55077945846617372d
      • Opcode Fuzzy Hash: d0a7d7fc86d4a434f4f961f875527448c970b76fe99bbb170c4fd03ab25f859f
      • Instruction Fuzzy Hash: A0511A33605B8282D750DF20E4517AE33E8FB45F48F584938DE980BBA9DF38D5A1A724
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: expf$powf
      • String ID:
      • API String ID: 1708648469-0
      • Opcode ID: fdc2551f88e3d402a1ad03bde36849fadebda3d65a3d91dfacf970641475a037
      • Instruction ID: 24f8dfc5a5c3acfbb625186046ef4454c730493078682501c6fe07e8e73ba340
      • Opcode Fuzzy Hash: fdc2551f88e3d402a1ad03bde36849fadebda3d65a3d91dfacf970641475a037
      • Instruction Fuzzy Hash: 0832A532A19BC696D752CF3794802A9B3A0FF5DB84F1C4732EE58265F9DB34A184DB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
      • String ID:
      • API String ID: 1573762532-0
      • Opcode ID: cb544c575eda29c76cc76fb8de9a00df0e5431656775d818450adb669725862b
      • Instruction ID: ed4254aaec1d8b81fa74efc7629959fb22fe29739c59e7708ce3996ff066db64
      • Opcode Fuzzy Hash: cb544c575eda29c76cc76fb8de9a00df0e5431656775d818450adb669725862b
      • Instruction Fuzzy Hash: 7741E562F1E36381EF616B119160AB973A0EB98BE4F844035E6A8076FDDF2CD955C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: __updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2808835054-0
      • Opcode ID: 7e5352838a252dc88f05503d6b2b72c422c338484f1f7b3aad8f6a7926a4f3cf
      • Instruction ID: 134f1b7ee007aa1216ce70c51f28f59d12b993ec0c8f35c2c4e22719da27a544
      • Opcode Fuzzy Hash: 7e5352838a252dc88f05503d6b2b72c422c338484f1f7b3aad8f6a7926a4f3cf
      • Instruction Fuzzy Hash: F731AFB6B0975A9AE7209F119150A7DB6A4FB48BD0F144139FB68077F9CF78E8418B00
      APIs
      • WideCharToMultiByte.KERNEL32 ref: 00007FFDFB7CBD90
      • _calloc_crt.LIBCMT ref: 00007FFDFB7CBDA9
        • Part of subcall function 00007FFDFB7D2268: _calloc_impl.LIBCMT ref: 00007FFDFB7D2296
        • Part of subcall function 00007FFDFB7D2268: Sleep.KERNEL32(?,?,?,00007FFDFB7D02A6,?,?,00000000,00007FFDFB7C5EF1,?,?,?,?,00007FFDFB7C5696,?,?,00000000), ref: 00007FFDFB7D22AD
      • WideCharToMultiByte.KERNEL32 ref: 00007FFDFB7CBDD7
      • __crtsetenv.LIBCMT ref: 00007FFDFB7CBDE8
        • Part of subcall function 00007FFDFB7D5B10: _errno.LIBCMT ref: 00007FFDFB7D5B39
        • Part of subcall function 00007FFDFB7D5B10: _invalid_parameter_noinfo.LIBCMT ref: 00007FFDFB7D5B44
      • free.LIBCMT ref: 00007FFDFB7CBDFB
        • Part of subcall function 00007FFDFB7C55B8: HeapFree.KERNEL32(?,?,00000000,00007FFDFB7D02DE,?,?,00000000,00007FFDFB7C5EF1,?,?,?,?,00007FFDFB7C5696,?,?,00000000), ref: 00007FFDFB7C55CE
        • Part of subcall function 00007FFDFB7C55B8: _errno.LIBCMT ref: 00007FFDFB7C55D8
        • Part of subcall function 00007FFDFB7C55B8: GetLastError.KERNEL32(?,?,00000000,00007FFDFB7D02DE,?,?,00000000,00007FFDFB7C5EF1,?,?,?,?,00007FFDFB7C5696,?,?,00000000), ref: 00007FFDFB7C55E0
      • free.LIBCMT ref: 00007FFDFB7CBE2D
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: ByteCharMultiWide_errnofree$ErrorFreeHeapLastSleep__crtsetenv_calloc_crt_calloc_impl_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2386806420-0
      • Opcode ID: a24ff8d20406d98eb0b0fc6edf5af700fb4362a541eb14922819069ebac0320a
      • Instruction ID: 898ef7acf4092d8c3e8b04b5e4242a4dd1cb5317887fc0319f7393c96e37d010
      • Opcode Fuzzy Hash: a24ff8d20406d98eb0b0fc6edf5af700fb4362a541eb14922819069ebac0320a
      • Instruction Fuzzy Hash: 7F214162B1AB4686EB50CB51E46473AB391FF98B95F044638EA9D46BFDDF7CD0048700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cvtdate$_errno_get_daylight_invalid_parameter_noinfo_invoke_watson
      • String ID:
      • API String ID: 1447642234-0
      • Opcode ID: 930788c0511e876fb9d1b6c3bae178df91865e2d3df05812356712d4aeda7236
      • Instruction ID: 248a4695ddaa9113e24f7419d2974279f671cdaa4efd2c2791446453fa6d7c49
      • Opcode Fuzzy Hash: 930788c0511e876fb9d1b6c3bae178df91865e2d3df05812356712d4aeda7236
      • Instruction Fuzzy Hash: 0881FC72B1D6538BE7648F15E450839FBA1FBD8780F14813AE69942ABCDBBCE5548F00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
      • String ID:
      • API String ID: 304646821-0
      • Opcode ID: 35ed1d0748665604b8cd426b0d2ad229d41b6410fdeee5ef6dc59a14ccd34ed1
      • Instruction ID: 21d0596cef2bedcac7c37e21cefe10f09b01cf1a9ce7871c3520a3c4fca39b51
      • Opcode Fuzzy Hash: 35ed1d0748665604b8cd426b0d2ad229d41b6410fdeee5ef6dc59a14ccd34ed1
      • Instruction Fuzzy Hash: 4441CEB2B1A74396E7149F28E462A7D36A0EB84B95F144239DA6D473FDDE2CE840C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _getptd_noexit$__doserrno_errno
      • String ID:
      • API String ID: 2964073243-0
      • Opcode ID: 8ec86cb927d3f0bf9b5d16bdc62024f4cab3035cb0610db295f80182dd7717eb
      • Instruction ID: 4359ab3947a01dd772598a022219810cbd787c2e12c87e92bf950c238c05dae1
      • Opcode Fuzzy Hash: 8ec86cb927d3f0bf9b5d16bdc62024f4cab3035cb0610db295f80182dd7717eb
      • Instruction Fuzzy Hash: 9401ADB2F2EB0749EB056B14C8A1BBC72516FA9BA1F948334C53D0A3FADF6D74448210
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: free$fclose
      • String ID:
      • API String ID: 2681820439-0
      • Opcode ID: 108c3f415a55e3eb707ca68f88f7b2022268621ac9a073d40ea675219922cb88
      • Instruction ID: 077f2a8d3402b810d35bd9a4186a1c714946d4729d29e25256fb51453602601e
      • Opcode Fuzzy Hash: 108c3f415a55e3eb707ca68f88f7b2022268621ac9a073d40ea675219922cb88
      • Instruction Fuzzy Hash: D651F932716B9581EB10DF2AD09066C77A4F788F98F184126EB9D4B7A8CF35D892C790
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: ByteCharMultiWide$_errno_isleadbyte_l
      • String ID:
      • API String ID: 693119720-0
      • Opcode ID: 696913fabc95edca3358c3209232512cb088cb9f23729fb29a498da79662b34c
      • Instruction ID: 41b139aa60a3e0e49c93274e408bbe9120c9306d5e00525ca47697a660a1469f
      • Opcode Fuzzy Hash: 696913fabc95edca3358c3209232512cb088cb9f23729fb29a498da79662b34c
      • Instruction Fuzzy Hash: 4B41713271A78386E7608B15D190A3977A6FB88BC0F144135EBA957BF9DE38E9458700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cosfsinf
      • String ID:
      • API String ID: 3160392742-3916222277
      • Opcode ID: 4e99629933c89068668fbafdf8b84dc1db5688a563963e5d8d546c21ed3a777a
      • Instruction ID: 6ef8727859c879b579b4ca958e4009b8dede8c211cc2f4dc5e015f77a5d0d92e
      • Opcode Fuzzy Hash: 4e99629933c89068668fbafdf8b84dc1db5688a563963e5d8d546c21ed3a777a
      • Instruction Fuzzy Hash: FD0239B2F1A78A86E711DB3680517F8B350FF59789F149332DA2D266F9DB38A081C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cosfsinf
      • String ID:
      • API String ID: 3160392742-3916222277
      • Opcode ID: 2f085247c3544add8112bb4764a9537a8a2b2b44b403aa52b5e4c1d0dbcc7ac3
      • Instruction ID: c1bebb1764ba90886ddcfa8194a462ba01c5b92b9b7f9acadb74c2c0d24e9790
      • Opcode Fuzzy Hash: 2f085247c3544add8112bb4764a9537a8a2b2b44b403aa52b5e4c1d0dbcc7ac3
      • Instruction Fuzzy Hash: F50229B2F1A78A86E7119B3680517F8B350FF59789F149332DA2D266F9DB38A485C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cosfsinf
      • String ID:
      • API String ID: 3160392742-3916222277
      • Opcode ID: 6b9e48bce4dd564b645f08cec95b38896f8c0935424526920958d0372f1359d0
      • Instruction ID: 904cae814b3206c4ce97527abf2c42de5df41623c1d9b9af27da40f166b9b9ec
      • Opcode Fuzzy Hash: 6b9e48bce4dd564b645f08cec95b38896f8c0935424526920958d0372f1359d0
      • Instruction Fuzzy Hash: F70239B2F1A78A86E711DB3680517F8B350FF59789F149332DA2D266F9DB38A081C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cosfsinf
      • String ID:
      • API String ID: 3160392742-3916222277
      • Opcode ID: 6457c141fc328de7455f394615bfa569a0097b361a7db34244dc34ae07edb811
      • Instruction ID: 4cbc7fdcc4a9614f1f6815378cd895b5e38312cc6a5cfe688b7935e30af3c447
      • Opcode Fuzzy Hash: 6457c141fc328de7455f394615bfa569a0097b361a7db34244dc34ae07edb811
      • Instruction Fuzzy Hash: 340229B2F1A78A86E711DB3680517F8B350FF59789F149332DA2D266F9DB38A485C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cosfsinf
      • String ID:
      • API String ID: 3160392742-3916222277
      • Opcode ID: 6398b1d9df5bbab5bb5690c94f73c294d9bd5313bceb62614fd7a41f0cf4bf16
      • Instruction ID: 95bf427950a9237fa56f5d496194d604ca89b9b82b4863012f8c281ccd3cbb40
      • Opcode Fuzzy Hash: 6398b1d9df5bbab5bb5690c94f73c294d9bd5313bceb62614fd7a41f0cf4bf16
      • Instruction Fuzzy Hash: ED0239B2F1A78A86E711DB3680517F8B350FF59789F149332DA2D266F9DB38A081C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: cosfsinf
      • String ID:
      • API String ID: 3160392742-3916222277
      • Opcode ID: 7256ee710f511ddc66509c85e73465f3895d0c79326bc58eeb99aa304a6f0ad1
      • Instruction ID: 98f7fbe22d79b57c461698aa1e777b3c860bf2fb86b6be412e9f34ebf603c59d
      • Opcode Fuzzy Hash: 7256ee710f511ddc66509c85e73465f3895d0c79326bc58eeb99aa304a6f0ad1
      • Instruction Fuzzy Hash: B10229B2F1A78A86E711DB3680517F8B350FF59789F149332DA2D266F9DB38A485C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _wassert
      • String ID: ..\..\..\src\pl2_encode_subroutine.c$0 == dspsBlockSize % 2
      • API String ID: 3234217646-1000197177
      • Opcode ID: 4d36218ff8500c2bf89829a00a3edff875a89c2d608e168150e23077c162806d
      • Instruction ID: eafde79c5a4aedd8488cad8383fb84dd4490d1ea1e7fad7b44d9076f6f306efd
      • Opcode Fuzzy Hash: 4d36218ff8500c2bf89829a00a3edff875a89c2d608e168150e23077c162806d
      • Instruction Fuzzy Hash: 1651B822A24FCD84D3128B3A94425F5B3A0FF7E395F1DD712FE5422671EB25A592D700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _wassert
      • String ID: ..\..\..\src\pl2_encode_subroutine.c$0 == dspsBlockSize % 2
      • API String ID: 3234217646-1000197177
      • Opcode ID: 02d53ebe6611131c35216c4ff81e676e1c937283c651944499320661acdc989c
      • Instruction ID: 62677dc2d5ffcbc5838424dde52501781493acf3227cdcfec8724a1bb365fba9
      • Opcode Fuzzy Hash: 02d53ebe6611131c35216c4ff81e676e1c937283c651944499320661acdc989c
      • Instruction Fuzzy Hash: D641A322A24F8986D3128B3798416F9B360FF6D785F19D722EF58236B4DB35E582C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _wassert
      • String ID: ..\..\..\src\pl2_encode_subroutine.c$0 == dspsBlockSize % 2
      • API String ID: 3234217646-1000197177
      • Opcode ID: ba859c02d8599028b0daa70bec84deb333e79eb210a3e18e72580916a6e25cd8
      • Instruction ID: 69e98335ebcd8cf64e48859732228717283efb217583aea53d7cc9aae49f1d10
      • Opcode Fuzzy Hash: ba859c02d8599028b0daa70bec84deb333e79eb210a3e18e72580916a6e25cd8
      • Instruction Fuzzy Hash: F831A822B24F8995D3118B3794411FAB360FFAD795F19D322EE58237B4DB35E5528700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _handle_errorf
      • String ID: !$cosf
      • API String ID: 2315412904-2208875612
      • Opcode ID: 63606d15fc3c2f1deeb4b1b6ca406c493bc4a7ca203522b4a1feb5f77963e258
      • Instruction ID: cd746cfdc11b99dd1ee803d2ecd0b5ed93f5a3dfc34209b318ce29f8094a1b5a
      • Opcode Fuzzy Hash: 63606d15fc3c2f1deeb4b1b6ca406c493bc4a7ca203522b4a1feb5f77963e258
      • Instruction Fuzzy Hash: EF11A372A2874287F3148B2AA46177AB650FBD4384F604328F79546AFDDB7CD1855F00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: _handle_errorf
      • String ID: !$sinf
      • API String ID: 2315412904-676365165
      • Opcode ID: d6c4bf276b7ffb7312a701024eddb8b761c0c97b1e16a54095582b3cc0a38f5d
      • Instruction ID: 482260a2374f5428ecd51d6e4880cfdec61cbd1210f16725de16eaa5faaad629
      • Opcode Fuzzy Hash: d6c4bf276b7ffb7312a701024eddb8b761c0c97b1e16a54095582b3cc0a38f5d
      • Instruction Fuzzy Hash: D001B572A2878283F310CB2AA45577AB650FBD5388F304329E785066FCCB7CD1815F00
      APIs
      Strings
      • c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\platforms\win\src\fmod_os_misc.cpp, xrefs: 00007FFDFB76A1B1
      Memory Dump Source
      • Source File: 00000000.00000002.2941168327.00007FFDFB6B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB6B0000, based on PE: true
      • Associated: 00000000.00000002.2941154875.00007FFDFB6B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941258987.00007FFDFB7E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941305409.00007FFDFB83A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941322949.00007FFDFB848000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941336451.00007FFDFB84A000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941358941.00007FFDFB887000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941372388.00007FFDFB88C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2941385549.00007FFDFB88F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ffdfb6b0000_loaddll64.jbxd
      Similarity
      • API ID: CriticalCurrentDeleteSectionThread
      • String ID: c:\jk\workspace\Build__1.10__API_Win\lowlevel_api\platforms\win\src\fmod_os_misc.cpp
      • API String ID: 2940376874-1608996347
      • Opcode ID: 76344774ecde4ceb1c81590bfa67d70b62bd4f3ba7390e471a7c5522e55a4519
      • Instruction ID: d374f4f2927589b3af15e23434c29aa0ffe76a0bc5a535e99ad21daa72df0722
      • Opcode Fuzzy Hash: 76344774ecde4ceb1c81590bfa67d70b62bd4f3ba7390e471a7c5522e55a4519
      • Instruction Fuzzy Hash: 01F0A721B1A74784EB645B55F8658783361AF84B94F144131D97E072F8CE3CD4418300