Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
msimg32.dll

Overview

General Information

Sample name:msimg32.dll
Analysis ID:1538457
MD5:b4f2a28b37eaccd3127d0cb4c4fa990f
SHA1:ebcb32378d1d9795bef11632d83937eb416b6c9b
SHA256:0c53f398b982342ad9d336bf2a6bfc0d93e5687d1814f3bf761832795df69cd2
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to simulate mouse events
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7824 cmdline: loaddll32.exe "C:\Users\user\Desktop\msimg32.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7884 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7904 cmdline: rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7892 cmdline: rundll32.exe C:\Users\user\Desktop\msimg32.dll,AlphaBlend MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7988 cmdline: rundll32.exe C:\Users\user\Desktop\msimg32.dll,AppendCaptureDeviceList MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8024 cmdline: rundll32.exe C:\Users\user\Desktop\msimg32.dll,AppendDeviceList MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: msimg32.dllVirustotal: Detection: 9%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.7% probability
Source: msimg32.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6468724C __PHYSFS_platformEnumerateFiles,__PHYSFS_initSmallAlloc,__PHYSFS_initSmallAlloc,PHYSFS_utf8ToUcs2,__PHYSFS_initSmallAlloc,WideCharToMultiByte,FindFirstFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,__PHYSFS_smallFree,FindNextFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,PHYSFS_utf8FromUcs2,FindClose,FindNextFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,__PHYSFS_setError,0_2_6468724C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6468724C __PHYSFS_platformEnumerateFiles,__PHYSFS_initSmallAlloc,__PHYSFS_initSmallAlloc,PHYSFS_utf8ToUcs2,__PHYSFS_initSmallAlloc,WideCharToMultiByte,FindFirstFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,__PHYSFS_smallFree,FindNextFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,PHYSFS_utf8FromUcs2,FindClose,FindNextFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,__PHYSFS_setError,4_2_6468724C
Source: msimg32.dllString found in binary or memory: http://icculus.org/physfs/
Source: loaddll32.exe, 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1815870196.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1817751739.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1830346417.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1831068963.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, msimg32.dllString found in binary or memory: http://icculus.org/physfs/4
Source: loaddll32.exe, 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1815870196.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1817751739.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1830346417.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1831068963.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, msimg32.dllString found in binary or memory: http://icculus.org/physfs/T
Source: msimg32.dllString found in binary or memory: http://icculus.org/physfs/t
Source: msimg32.dllString found in binary or memory: http://www.3dmm2.com/doom/
Source: loaddll32.exeBinary or memory string: DirectInput8Create
Source: loaddll32.exeBinary or memory string: GetRawInputData
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647108CC bitreader_read_from_client_,ntohl,ntohl,4_2_647108CC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCC480_2_645DCC48
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D7A370_2_645D7A37
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D54550_2_645D5455
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6473347C0_2_6473347C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA4790_2_645DA479
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6467E4540_2_6467E454
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D540F0_2_645D540F
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB4D70_2_645DB4D7
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D44C00_2_645D44C0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA4C00_2_645DA4C0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D24C30_2_645D24C3
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB4980_2_645DB498
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E04920_2_645E0492
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D24830_2_645D2483
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D44B80_2_645D44B8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D54BB0_2_645D54BB
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D55440_2_645D5544
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC5790_2_645DC579
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC5050_2_645DC505
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D55380_2_645D5538
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA5320_2_645DA532
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC5280_2_645DC528
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D45D80_2_645D45D8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E45D10_2_645E45D1
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD5CC0_2_645DD5CC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D55840_2_645D5584
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD5B70_2_645DD5B7
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D95B10_2_645D95B1
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E46210_2_645E4621
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646746E00_2_646746E0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646736E80_2_646736E8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D46E40_2_645D46E4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646F66A80_2_646F66A8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC6950_2_645DC695
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6467A6800_2_6467A680
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD7590_2_645DD759
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D47540_2_645D4754
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD74C0_2_645DD74C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA7430_2_645DA743
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC7730_2_645DC773
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD76A0_2_645DD76A
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA7F00_2_645DA7F0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC7E10_2_645DC7E1
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_647197CC0_2_647197CC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD7940_2_645DD794
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA7910_2_645DA791
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD7B70_2_645DD7B7
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD04B0_2_645DD04B
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD07D0_2_645DD07D
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E00740_2_645E0074
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E00650_2_645E0065
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D60180_2_645D6018
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB0050_2_645DB005
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D20D00_2_645D20D0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB0F90_2_645DB0F9
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D40E40_2_645D40E4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646590B00_2_646590B0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E50870_2_645E5087
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD0B90_2_645DD0B9
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC0B50_2_645DC0B5
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD0A20_2_645DD0A2
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC1470_2_645DC147
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E017F0_2_645E017F
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E017A0_2_645E017A
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB1730_2_645DB173
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D01640_2_645D0164
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB12B0_2_645DB12B
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645EB1D60_2_645EB1D6
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D21D70_2_645D21D7
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD1CC0_2_645DD1CC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E51C40_2_645E51C4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D21E00_2_645D21E0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645EC1950_2_645EC195
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D22460_2_645D2246
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D22710_2_645D2271
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC2170_2_645DC217
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D420C0_2_645D420C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D42040_2_645D4204
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB2200_2_645DB220
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D52220_2_645D5222
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB2DD0_2_645DB2DD
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D22DA0_2_645D22DA
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D42D40_2_645D42D4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D52FA0_2_645D52FA
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA2F20_2_645DA2F2
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DF2EA0_2_645DF2EA
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646032D80_2_646032D8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DC2950_2_645DC295
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA2960_2_645DA296
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB2860_2_645DB286
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DB2B80_2_645DB2B8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD2BB0_2_645DD2BB
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D42B40_2_645D42B4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E02B40_2_645E02B4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E52A80_2_645E52A8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E42A10_2_645E42A1
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E034F0_2_645E034F
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D234F0_2_645D234F
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645EC3770_2_645EC377
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6468D35C0_2_6468D35C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E036B0_2_645E036B
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D23650_2_645D2365
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D43180_2_645D4318
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA32B0_2_645DA32B
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D93CF0_2_645D93CF
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D23C00_2_645D23C0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D53900_2_645D5390
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D23860_2_645D2386
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D43B40_2_645D43B4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D53B70_2_645D53B7
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D43AC0_2_645D43AC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D43A40_2_645D43A4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64677C740_2_64677C74
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAC460_2_645DAC46
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D6C6A0_2_645D6C6A
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D8C1C0_2_645D8C1C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E3C370_2_645E3C37
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DACC20_2_645DACC2
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64626CC80_2_64626CC8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D6C990_2_645D6C99
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D4CA40_2_645D4CA4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCD5C0_2_645DCD5C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCD4C0_2_645DCD4C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E0D760_2_645E0D76
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCD740_2_645DCD74
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAD1D0_2_645DAD1D
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCD370_2_645DCD37
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAE160_2_645DAE16
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAE070_2_645DAE07
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D7E380_2_645D7E38
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAEEE0_2_645DAEEE
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D5EE00_2_645D5EE0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAEAC0_2_645DAEAC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAF4A0_2_645DAF4A
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645C8F1C0_2_645C8F1C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E0F0D0_2_645E0F0D
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCFD50_2_645DCFD5
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAFFC0_2_645DAFFC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCFE00_2_645DCFE0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAF9A0_2_645DAF9A
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E1FA90_2_645E1FA9
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD8780_2_645DD878
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646748340_2_64674834
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D383F0_2_645D383F
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E082D0_2_645E082D
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D28DF0_2_645D28DF
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D28EE0_2_645D28EE
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA8E70_2_645DA8E7
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E18910_2_645E1891
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD8870_2_645DD887
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E18800_2_645E1880
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D29750_2_645D2975
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D296E0_2_645D296E
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D59650_2_645D5965
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD9190_2_645DD919
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD9040_2_645DD904
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D29070_2_645D2907
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DD9300_2_645DD930
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D39210_2_645D3921
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D89CC0_2_645D89CC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646119C00_2_646119C0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646799C80_2_646799C8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D59930_2_645D5993
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D59B50_2_645D59B5
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D69AC0_2_645D69AC
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DA9AF0_2_645DA9AF
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D6A590_2_645D6A59
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D6A4D0_2_645D6A4D
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAA480_2_645DAA48
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E1A710_2_645E1A71
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D6A140_2_645D6A14
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D6A080_2_645D6A08
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D5A060_2_645D5A06
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64676A140_2_64676A14
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAACD0_2_645DAACD
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAAFF0_2_645DAAFF
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6467CB640_2_6467CB64
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D5B410_2_645D5B41
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAB240_2_645DAB24
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D8BD80_2_645D8BD8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCBD80_2_645DCBD8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D2BC80_2_645D2BC8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_647CBBC40_2_647CBBC4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DBBE40_2_645DBBE4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DCB9A0_2_645DCB9A
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645D3B8C0_2_645D3B8C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645DAB800_2_645DAB80
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645E0BA80_2_645E0BA8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCC484_2_645DCC48
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D7A374_2_645D7A37
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA4794_2_645DA479
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6467E4544_2_6467E454
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647124004_2_64712400
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D44C04_2_645D44C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA4C04_2_645DA4C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D24C34_2_645D24C3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E04924_2_645E0492
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D24834_2_645D2483
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D44B84_2_645D44B8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC5794_2_645DC579
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC5054_2_645DC505
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA5324_2_645DA532
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC5284_2_645DC528
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D45D84_2_645D45D8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E45D14_2_645E45D1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E46214_2_645E4621
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646746E04_2_646746E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D46E44_2_645D46E4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646F66A84_2_646F66A8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC6954_2_645DC695
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6467A6804_2_6467A680
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D47544_2_645D4754
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA7434_2_645DA743
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC7734_2_645DC773
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA7F04_2_645DA7F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC7E14_2_645DC7E1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA7914_2_645DA791
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E00744_2_645E0074
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E00654_2_645E0065
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D60184_2_645D6018
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D20D04_2_645D20D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647200C44_2_647200C4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D40E44_2_645D40E4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC0B54_2_645DC0B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC1474_2_645DC147
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E017F4_2_645E017F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E017A4_2_645E017A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D01644_2_645D0164
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D21D74_2_645D21D7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647141D84_2_647141D8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D21E04_2_645D21E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6470C1B84_2_6470C1B8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D22464_2_645D2246
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D22714_2_645D2271
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC2174_2_645DC217
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D420C4_2_645D420C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D42044_2_645D4204
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D22DA4_2_645D22DA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D42D44_2_645D42D4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA2F24_2_645DA2F2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DC2954_2_645DC295
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA2964_2_645DA296
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D42B44_2_645D42B4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E02B44_2_645E02B4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E42A14_2_645E42A1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E034F4_2_645E034F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D234F4_2_645D234F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645EC3774_2_645EC377
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E036B4_2_645E036B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D23654_2_645D2365
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D43184_2_645D4318
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA32B4_2_645DA32B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D23C04_2_645D23C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D23864_2_645D2386
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D43B44_2_645D43B4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D43AC4_2_645D43AC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D43A44_2_645D43A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAC464_2_645DAC46
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D6C6A4_2_645D6C6A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D8C1C4_2_645D8C1C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DACC24_2_645DACC2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_64626CC84_2_64626CC8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D6C994_2_645D6C99
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D4CA44_2_645D4CA4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCD5C4_2_645DCD5C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCD4C4_2_645DCD4C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E0D764_2_645E0D76
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCD744_2_645DCD74
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAD1D4_2_645DAD1D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCD374_2_645DCD37
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAE164_2_645DAE16
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAE074_2_645DAE07
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAEEE4_2_645DAEEE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAEAC4_2_645DAEAC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAF4A4_2_645DAF4A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645C8F1C4_2_645C8F1C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E0F0D4_2_645E0F0D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCFD54_2_645DCFD5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_64712FD04_2_64712FD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAFFC4_2_645DAFFC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCFE04_2_645DCFE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAF9A4_2_645DAF9A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646748344_2_64674834
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6470E8244_2_6470E824
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E082D4_2_645E082D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647128044_2_64712804
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D28DF4_2_645D28DF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D28EE4_2_645D28EE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA8E74_2_645DA8E7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D29754_2_645D2975
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D296E4_2_645D296E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D29074_2_645D2907
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647149004_2_64714900
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647109F84_2_647109F8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D89CC4_2_645D89CC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D69AC4_2_645D69AC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DA9AF4_2_645DA9AF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D6A594_2_645D6A59
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D6A4D4_2_645D6A4D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAA484_2_645DAA48
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D6A144_2_645D6A14
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D6A084_2_645D6A08
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_64676A144_2_64676A14
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAACD4_2_645DAACD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAAFF4_2_645DAAFF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6467CB644_2_6467CB64
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAB244_2_645DAB24
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D8BD84_2_645D8BD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCBD84_2_645DCBD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D2BC84_2_645D2BC8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DCB9A4_2_645DCB9A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DAB804_2_645DAB80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E0BA84_2_645E0BA8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D54554_2_645D5455
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6473347C4_2_6473347C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D540F4_2_645D540F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB4D74_2_645DB4D7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647114E84_2_647114E8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB4984_2_645DB498
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D54BB4_2_645D54BB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D55444_2_645D5544
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D55384_2_645D5538
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD5CC4_2_645DD5CC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D55844_2_645D5584
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD5B74_2_645DD5B7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D95B14_2_645D95B1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646736E84_2_646736E8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647217704_2_64721770
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD7594_2_645DD759
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD74C4_2_645DD74C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD76A4_2_645DD76A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647197CC4_2_647197CC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD7944_2_645DD794
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD7B74_2_645DD7B7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD04B4_2_645DD04B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD07D4_2_645DD07D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB0054_2_645DB005
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB0F94_2_645DB0F9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646590B04_2_646590B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E50874_2_645E5087
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD0B94_2_645DD0B9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD0A24_2_645DD0A2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB1734_2_645DB173
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB12B4_2_645DB12B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645EB1D64_2_645EB1D6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD1CC4_2_645DD1CC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E51C44_2_645E51C4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB2204_2_645DB220
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D52224_2_645D5222
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB2DD4_2_645DB2DD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D52FA4_2_645D52FA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DF2EA4_2_645DF2EA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646032D84_2_646032D8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB2864_2_645DB286
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DB2B84_2_645DB2B8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD2BB4_2_645DD2BB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E52A84_2_645E52A8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6468D35C4_2_6468D35C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D93CF4_2_645D93CF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D53904_2_645D5390
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D53B74_2_645D53B7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_64677C744_2_64677C74
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E3C374_2_645E3C37
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D7E384_2_645D7E38
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D5EE04_2_645D5EE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_64715F804_2_64715F80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E1FA94_2_645E1FA9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647158704_2_64715870
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD8784_2_645DD878
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D383F4_2_645D383F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E18914_2_645E1891
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD8874_2_645DD887
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E18804_2_645E1880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647118984_2_64711898
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D59654_2_645D5965
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD9194_2_645DD919
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD9044_2_645DD904
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DD9304_2_645DD930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D39214_2_645D3921
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6470B9E04_2_6470B9E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646119C04_2_646119C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646799C84_2_646799C8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D59934_2_645D5993
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D59B54_2_645D59B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645E1A714_2_645E1A71
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D5A064_2_645D5A06
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D5B414_2_645D5B41
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_647CBBC44_2_647CBBC4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645DBBE44_2_645DBBE4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_645D3B8C4_2_645D3B8C
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6460BB88 appears 243 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6460370C appears 59 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6460BD60 appears 149 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 64603730 appears 125 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 645C478C appears 51 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 646808C4 appears 107 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 647672B0 appears 1948 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 645E6AD4 appears 252 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6460BB88 appears 243 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6460370C appears 59 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6460BD60 appears 149 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 64603730 appears 125 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 645C478C appears 51 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 646808C4 appears 107 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 647672B0 appears 1948 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 645E6AD4 appears 252 times
Source: msimg32.dllStatic PE information: Number of sections : 20 > 10
Source: msimg32.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal52.winDLL@12/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7832:120:WilError_03
Source: msimg32.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msimg32.dll,AlphaBlend
Source: msimg32.dllVirustotal: Detection: 9%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\msimg32.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msimg32.dll,AlphaBlend
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msimg32.dll,AppendCaptureDeviceList
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msimg32.dll,AppendDeviceList
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msimg32.dll,AlphaBlendJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msimg32.dll,AppendCaptureDeviceListJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\msimg32.dll,AppendDeviceListJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: opengl32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: glu32.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: msimg32.dllStatic PE information: More than 4564 > 100 exports found
Source: msimg32.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: msimg32.dllStatic PE information: Image base 0x645c0000 > 0x60000000
Source: msimg32.dllStatic file information: File size 3937280 > 1048576
Source: msimg32.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x218600
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64687C10 __PHYSFS_platformInit,GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetLastError,__PHYSFS_setError,GetProcAddress,PHYSFS_utf8FromUcs2,__PHYSFS_setError,__PHYSFS_setError,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_64687C10
Source: msimg32.dllStatic PE information: real checksum: 0x386e1e should be: 0x3cac1d
Source: msimg32.dllStatic PE information: section name: /4
Source: msimg32.dllStatic PE information: section name: /14
Source: msimg32.dllStatic PE information: section name: /29
Source: msimg32.dllStatic PE information: section name: /45
Source: msimg32.dllStatic PE information: section name: /61
Source: msimg32.dllStatic PE information: section name: /73
Source: msimg32.dllStatic PE information: section name: /87
Source: msimg32.dllStatic PE information: section name: /99
Source: msimg32.dllStatic PE information: section name: /112
Source: msimg32.dllStatic PE information: section name: /123
Source: msimg32.dllStatic PE information: section name: /134
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469C434 push edx; mov dword ptr [esp], 64876604h0_2_6469C751
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_646884F0 push edi; mov dword ptr [esp], ebx0_2_6468855B
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_647D25E8 push eax; mov dword ptr [esp], 64877B98h0_2_647D2649
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_647D25E8 push ecx; mov dword ptr [esp], 647D2698h0_2_647D2656
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469A59C push eax; mov dword ptr [esp], 64876604h0_2_6469A5B1
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469A59C push ebx; mov dword ptr [esp], 64876604h0_2_6469A615
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64688650 push eax; mov dword ptr [esp], ebx0_2_64688772
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469A6F4 push eax; mov dword ptr [esp], 64876604h0_2_6469A709
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469A6F4 push edx; mov dword ptr [esp], 64876604h0_2_6469A7D9
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469977C push eax; mov dword ptr [esp], 64876604h0_2_64699791
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469977C push eax; mov dword ptr [esp], 64876604h0_2_646997E9
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64699064 push eax; mov dword ptr [esp], 64876604h0_2_64699079
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64699064 push eax; mov dword ptr [esp], 64876604h0_2_646990E9
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64699140 push edx; mov dword ptr [esp], 64876604h0_2_646991D9
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6468813C push eax; mov dword ptr [esp], ebx0_2_646881A4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push eax; mov dword ptr [esp], 64876604h0_2_6469B8C3
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push eax; mov dword ptr [esp], 64876604h0_2_6469B904
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push ecx; mov dword ptr [esp], 64876604h0_2_6469B944
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push eax; mov dword ptr [esp], 64876604h0_2_6469B984
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push ecx; mov dword ptr [esp], 64876604h0_2_6469B9D6
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push eax; mov dword ptr [esp], 64876604h0_2_6469BA34
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push eax; mov dword ptr [esp], 64876604h0_2_6469BA74
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push eax; mov dword ptr [esp], 64876604h0_2_6469BAB4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push ecx; mov dword ptr [esp], 64876604h0_2_6469BAF4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6469B20C push eax; mov dword ptr [esp], 64876604h0_2_6469BB34
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64699218 push eax; mov dword ptr [esp], 64876604h0_2_646992A5
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_645FE2E8 push eax; mov dword ptr [esp], ebp0_2_645FE328
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6466C3EC push eax; mov dword ptr [esp], esi0_2_6466C42E
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64699388 push ecx; mov dword ptr [esp], 64876604h0_2_646993A0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64699388 push edi; mov dword ptr [esp], 64876604h0_2_646994F3
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64699388 push edx; mov dword ptr [esp], 64876604h0_2_64699529
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64687C10 __PHYSFS_platformInit,GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetLastError,__PHYSFS_setError,GetProcAddress,PHYSFS_utf8FromUcs2,__PHYSFS_setError,__PHYSFS_setError,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_64687C10
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeAPI coverage: 0.0 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.0 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6468724C __PHYSFS_platformEnumerateFiles,__PHYSFS_initSmallAlloc,__PHYSFS_initSmallAlloc,PHYSFS_utf8ToUcs2,__PHYSFS_initSmallAlloc,WideCharToMultiByte,FindFirstFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,__PHYSFS_smallFree,FindNextFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,PHYSFS_utf8FromUcs2,FindClose,FindNextFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,__PHYSFS_setError,0_2_6468724C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6468724C __PHYSFS_platformEnumerateFiles,__PHYSFS_initSmallAlloc,__PHYSFS_initSmallAlloc,PHYSFS_utf8ToUcs2,__PHYSFS_initSmallAlloc,WideCharToMultiByte,FindFirstFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,__PHYSFS_smallFree,FindNextFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,PHYSFS_utf8FromUcs2,FindClose,FindNextFileA,__PHYSFS_smallFree,__PHYSFS_smallFree,__PHYSFS_setError,4_2_6468724C
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64687C10 __PHYSFS_platformInit,GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetLastError,__PHYSFS_setError,GetProcAddress,PHYSFS_utf8FromUcs2,__PHYSFS_setError,__PHYSFS_setError,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_64687C10
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6460B7CC al_get_mouse_event_source,0_2_6460B7CC
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1Jump to behavior
Source: loaddll32.exe, 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1815870196.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1817751739.00000000647E4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MbPAd:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\wunicode.c_al_win_utf16_al_win_utf8d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\wwindow.cShell_traywndy
Source: loaddll32.exe, loaddll32.exe, 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000004.00000002.1815870196.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1817751739.00000000647E4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Shell_traywnd
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64681488 PHYSFS_init,__PHYSFS_platformInit,__PHYSFS_platformCreateMutex,__PHYSFS_platformCreateMutex,__PHYSFS_platformCalcBaseDir,__PHYSFS_platformRealPath,__PHYSFS_platformGetUserDir,__PHYSFS_platformRealPath,__PHYSFS_platformGrabMutex,__PHYSFS_platformGetThreadID,__PHYSFS_platformReleaseMutex,__PHYSFS_setError,__PHYSFS_setError,__PHYSFS_platformSetDefaultAllocator,__PHYSFS_setError,__PHYSFS_platformDestroyMutex,__PHYSFS_platformDestroyMutex,__PHYSFS_platformGetUserName,__PHYSFS_platformReleaseMutex,__PHYSFS_setError,__PHYSFS_setError,__PHYSFS_setError,0_2_64681488
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64686880 FileTimeToSystemTime,GetTimeZoneInformation,SystemTimeToTzSpecificLocalTime,FileTimeToSystemTime,GetLastError,PHYSFS_utf8FromUcs2,__PHYSFS_setError,GetLastError,GetLastError,__PHYSFS_setError,0_2_64686880
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64687C10 __PHYSFS_platformInit,GetVersionExA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetLastError,__PHYSFS_setError,GetProcAddress,PHYSFS_utf8FromUcs2,__PHYSFS_setError,__PHYSFS_setError,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_64687C10
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64602158 _al_parse_key_binding,al_ustr_new,al_ustr_trim_ws,al_ustr_size,al_ustr_find_set_cstr,al_ustr_set_chr,al_cstr,_al_stricmp,_al_stricmp,_al_stricmp,al_ustr_free,al_cstr,_al_stricmp,_al_stricmp,_al_stricmp,_al_stricmp,_al_stricmp,0_2_64602158
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_64677C74 SzGetNextFolderItem,SzByteBufferCreate,SzReadNumber32,SzReadNumber32,SzCoderInfoInit,SzFolderFindBindPairForInStream,SzReadNumber32,0_2_64677C74
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6467EAE8 SzFolderFindBindPairForInStream,0_2_6467EAE8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6467EB18 SzFolderFindBindPairForOutStream,0_2_6467EB18
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646AE03C alGetListener3f,GetContextSuspended,alSetError,alSetError,4_2_646AE03C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_64602158 _al_parse_key_binding,al_ustr_new,al_ustr_trim_ws,al_ustr_size,al_ustr_find_set_cstr,al_ustr_set_chr,al_cstr,_al_stricmp,_al_stricmp,_al_stricmp,al_ustr_free,al_cstr,_al_stricmp,_al_stricmp,_al_stricmp,_al_stricmp,_al_stricmp,4_2_64602158
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646AE114 alGetListenerfv,GetContextSuspended,alSetError,alSetError,4_2_646AE114
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646AE250 alGetListeneri,GetContextSuspended,alSetError,alSetError,4_2_646AE250
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646AE2B0 alGetListener3i,GetContextSuspended,alSetError,alSetError,4_2_646AE2B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646AE3E8 alGetListeneriv,GetContextSuspended,alSetError,alSetError,4_2_646AE3E8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6467EAE8 SzFolderFindBindPairForInStream,4_2_6467EAE8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6467EB18 SzFolderFindBindPairForOutStream,4_2_6467EB18
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_64677C74 SzGetNextFolderItem,SzByteBufferCreate,SzReadNumber32,SzReadNumber32,SzCoderInfoInit,SzFolderFindBindPairForInStream,SzReadNumber32,4_2_64677C74
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646ADD64 alListeneri,GetContextSuspended,alSetError,4_2_646ADD64
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646ADD98 alListener3i,GetContextSuspended,alSetError,GetContextSuspended,alSetError,ProcessContext,ProcessContext,4_2_646ADD98
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646ADEC8 alListeneriv,GetContextSuspended,alSetError,ProcessContext,alListenerfv,alListenerfv,alSetError,4_2_646ADEC8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646ADFA0 alGetListenerf,GetContextSuspended,alSetError,alSetError,4_2_646ADFA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646AD944 alListenerf,GetContextSuspended,alSetError,alSetError,4_2_646AD944
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646ADA10 alListener3f,GetContextSuspended,alSetError,4_2_646ADA10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_646ADAE0 alListenerfv,GetContextSuspended,alSetError,GetContextSuspended,alSetError,ProcessContext,GetContextSuspended,alSetError,ProcessContext,alSetError,alSetError,4_2_646ADAE0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
12
Process Injection
12
Process Injection
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Process Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Rundll32
NTDS1
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1538457 Sample: msimg32.dll Startdate: 21/10/2024 Architecture: WINDOWS Score: 52 19 Multi AV Scanner detection for submitted file 2->19 21 AI detected suspicious sample 2->21 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        13 rundll32.exe 7->13         started        15 2 other processes 7->15 process5 17 rundll32.exe 9->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
msimg32.dll10%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://icculus.org/physfs/T0%VirustotalBrowse
http://icculus.org/physfs/40%VirustotalBrowse
http://icculus.org/physfs/0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.3dmm2.com/doom/msimg32.dllfalse
    unknown
    http://icculus.org/physfs/msimg32.dllfalseunknown
    http://icculus.org/physfs/4loaddll32.exe, 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1815870196.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1817751739.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1830346417.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1831068963.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, msimg32.dllfalseunknown
    http://icculus.org/physfs/Tloaddll32.exe, 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1815870196.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1817751739.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1830346417.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1831068963.00000000647E4000.00000002.00000001.01000000.00000003.sdmp, msimg32.dllfalseunknown
    http://icculus.org/physfs/tmsimg32.dllfalse
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1538457
      Start date and time:2024-10-21 10:35:39 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 49s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:msimg32.dll
      Detection:MAL
      Classification:mal52.winDLL@12/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing disassembly code.
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Entropy (8bit):6.937453453884552
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
      • Generic Win/DOS Executable (2004/3) 0.20%
      • DOS Executable Generic (2002/1) 0.20%
      • VXD Driver (31/22) 0.00%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:msimg32.dll
      File size:3'937'280 bytes
      MD5:b4f2a28b37eaccd3127d0cb4c4fa990f
      SHA1:ebcb32378d1d9795bef11632d83937eb416b6c9b
      SHA256:0c53f398b982342ad9d336bf2a6bfc0d93e5687d1814f3bf761832795df69cd2
      SHA512:f1a218d0b7d7cb7b97c38a089c7b058f6fabce343d8dceb4535b40207a98c688f5a2001eb669cf692d113d57f70ff1eb35f2c993781518bcb8be63f5dd5d2d66
      SSDEEP:98304:oMsztWzaCrAKei53bzXS1qPfipK//umjcvAwuBUc/C8vFI0ICETY:oMsztWzJrAKeyHjc4Cc/C8vFwTY
      TLSH:AD067D1CFB97D8E1D9A705758147F22E92319F154026EBA3FF98295AF833F226879310
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....V.Q.~0..?.....!......!...<.....X.........!...\d..........................>......n8....... .......................+..T.
      Icon Hash:7ae282899bbab082
      Entrypoint:0x645c1058
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x645c0000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DLL
      DLL Characteristics:
      Time Stamp:0x51D856A6 [Sat Jul 6 17:40:54 2013 UTC]
      TLS Callbacks:0x647cb2d0, 0x647cb29c
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:8040ee0bc21ce34bd2e2f9a621b7585a
      Instruction
      push ebp
      mov ebp, esp
      push edi
      push esi
      push ebx
      sub esp, 2Ch
      mov esi, dword ptr [ebp+08h]
      mov ebx, dword ptr [ebp+0Ch]
      mov edi, dword ptr [ebp+10h]
      cmp ebx, 01h
      je 00007F9E4092DD9Fh
      mov dword ptr [esp+08h], edi
      mov dword ptr [esp+04h], ebx
      mov dword ptr [esp], esi
      call 00007F9E40B3803Eh
      sub esp, 0Ch
      test ebx, ebx
      jne 00007F9E4092DD7Bh
      mov edx, dword ptr [64871000h]
      test edx, edx
      je 00007F9E4092DDEAh
      mov dword ptr [ebp-1Ch], eax
      call 00007F9E4092DCC9h
      mov eax, dword ptr [ebp-1Ch]
      lea esp, dword ptr [ebp-0Ch]
      pop ebx
      pop esi
      pop edi
      leave
      retn 000Ch
      lea esi, dword ptr [esi+00h]
      mov dword ptr [esp], 00000080h
      call 00007F9E40B40F31h
      mov dword ptr [64871000h], eax
      test eax, eax
      je 00007F9E4092DDC5h
      mov dword ptr [eax], 00000000h
      mov dword ptr [64871004h], eax
      mov eax, dword ptr [648305E0h]
      test eax, eax
      je 00007F9E4092DD76h
      mov dword ptr [esp+08h], edi
      mov dword ptr [esp+04h], 00000002h
      mov dword ptr [esp], esi
      call eax
      sub esp, 0Ch
      call 00007F9E40B3810Bh
      call 00007F9E40B3834Eh
      mov dword ptr [esp+08h], edi
      mov dword ptr [esp+04h], 00000001h
      mov dword ptr [esp], esi
      call 00007F9E40B37FB6h
      sub esp, 0Ch
      test eax, eax
      je 00007F9E4092DCE8h
      lea esp, dword ptr [ebp-0Ch]
      pop ebx
      pop esi
      pop edi
      leave
      retn 000Ch
      xor eax, eax
      lea esp, dword ptr [ebp-0Ch]
      pop ebx
      pop esi
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x2ba0000x25412.edata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x2e00000x293c.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x31c0000xcb05c.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e50000x11b54.tls
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x2e40000x18.tls
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x2e070c0x5cc.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x2190000x21860076c7b20a1c25eddc81efdd2acc97b8beunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x21a0000xa0000x920096632e44c63c1c271bd72837d9cf811eFalse0.22348565924657535dBase III DBT, version number 0, next free block index 56, 1st item "jS~d"2.4420702277440887IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x2240000x4e0000x4d400c63939dea53ebb53aac869a6a6660fe5False0.4502996055825243data6.578340106653787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
      /40x2720000x3f0000x3ea00d9e75b64e9b723762e384ffcddfbaa60False0.2514424276447106data4.98706888477853IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
      .bss0x2b10000x90000x900049f487bd5eb9d753b06804d45ce0ca36False0.5464138454861112data6.609860478725795IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .edata0x2ba0000x260000x25600b1fb5cdf212ff15f128896abe19ef1a4False0.32970579013377926data6.031515284559032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
      .idata0x2e00000x30000x2a005d0e3c6a7eb5c89b84d92f0474b07776False0.36039806547619047data5.2939193300449165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .CRT0x2e30000x10000x200d86e3ea25221afba83c7218fb93d6a9fFalse0.044921875data0.15127132530476972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0x2e40000x130000x20027136df563e32e923b2a9e5bb11ea4c7False0.05078125data0.2764949176589459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      /140x2f70000x10000x60049713c24fcc57ad4f0f198a2dabe757bFalse0.2421875Matlab v4 mat-file (little endian) \203\001, rows 2, columns 2621441.9890201178218252IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /290x2f80000x10000xa0097c8f300ccf9482b5ecc612f4d9c82e8False0.460546875data4.386519181150674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /450x2f90000x10000xc001d2272dc7edab1fe9b9c44d67a481de3False0.3785807291666667data4.455153048492457IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /610x2fa0000xa0000x98004a91cf731dd8e2d046382288b2d2c60eFalse0.4247275904605263data5.865960202924763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /730x3040000x30000x24006e278409826502f4ddaaddfc553d9709False0.1950954861111111data4.429866381420267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /870x3070000x30000x30005f0a0cab194cfaba70b1c078c2132981False0.5581868489583334data6.081183860126673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /990x30a0000x20000x1800bd97106cf0760a5132ad6adb699edc31False0.2947591145833333data4.772441293939689IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /1120x30c0000x10000x400e3bee82bbde42fa7adef3092fdcc3872False0.2646484375data3.288015105952697IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /1230x30d0000xe0000xda00dc0ee375cdb5abd948e31fe26a22c804False0.357421875data4.308028159748271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /1340x31b0000x3e80x40080278d9aa246a8e04c55923ffe985327False0.3515625data2.8907351444719196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      .rsrc0x31c0000xcb05c0xcb2004f928f79ea3c310d42464982fd49f381False0.5934447115384616data7.4628232852934335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_BITMAP0x31c1980x55036PC bitmap, Windows 3.x format, 44247 x 2 x 49, image size 349035, cbSize 348214, bits offset 540.7367681942713389
      RT_ICON0x3711d00xb263PC bitmap, Windows 3.x format, 5785 x 2 x 54, image size 45946, cbSize 45667, bits offset 540.48888694243107716
      RT_ICON0x37c4340x7e07PC bitmap, Windows 3.x format, 4234 x 2 x 41, image size 32382, cbSize 32263, bits offset 540.4520348386696835
      RT_ICON0x38423c0x4678PC bitmap, Windows 3.x format, 2305 x 2 x 38, image size 18342, cbSize 18040, bits offset 540.4402439024390244
      RT_ICON0x3888b40x2f747PC bitmap, Windows 3.x format, 25121 x 2 x 45, image size 194421, cbSize 194375, bits offset 540.5136154340836013
      RT_ICON0x3b7ffc0x2f05dPC bitmap, Windows 3.x format, 24730 x 2 x 52, image size 193194, cbSize 192605, bits offset 540.48222527971755663
      DLLImport
      gdiplus.dllGdipAlloc, GdipBitmapLockBits, GdipBitmapUnlockBits, GdipCloneImage, GdipCreateBitmapFromScan0, GdipCreateBitmapFromStream, GdipDeleteCachedBitmap, GdipDeleteCustomLineCap, GdipDeletePrivateFontCollection, GdipDisposeImage, GdipFree, GdipGetImageEncoders, GdipGetImageEncodersSize, GdipGetImageHeight, GdipGetImageWidth, GdipSaveImageToStream, GdiplusShutdown, GdiplusStartup
      ADVAPI32.DLLGetUserNameA, OpenProcessToken
      COMDLG32.DLLGetOpenFileNameA, GetSaveFileNameA
      GDI32.dllChoosePixelFormat, CreateBitmap, CreateCompatibleBitmap, CreateCompatibleDC, CreateFontA, CreateRectRgn, DeleteDC, DeleteObject, DescribePixelFormat, GetRegionData, GetStockObject, SelectObject, SetPixel, SetPixelFormat, StretchDIBits, SwapBuffers
      KERNEL32.dllCloseHandle, CreateDirectoryA, CreateEventA, CreateFileA, CreateMutexA, CreateSemaphoreA, CreateThread, CreateWaitableTimerA, DeleteCriticalSection, DeleteFileA, EnterCriticalSection, ExitThread, FileTimeToSystemTime, FindClose, FindFirstFileA, FindNextFileA, FlushFileBuffers, FormatMessageA, FreeLibrary, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcess, GetCurrentThread, GetCurrentThreadId, GetDriveTypeA, GetExitCodeThread, GetFileAttributesA, GetFileAttributesW, GetFileSize, GetFileTime, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, GetTempPathA, GetTimeZoneInformation, GetVersionExA, GetVolumeInformationA, InitializeCriticalSection, InterlockedDecrement, InterlockedExchange, InterlockedIncrement, IsBadWritePtr, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, MultiByteToWideChar, QueryPerformanceCounter, QueryPerformanceFrequency, ReadFile, ReleaseMutex, ReleaseSemaphore, RemoveDirectoryA, SetErrorMode, SetEvent, SetFilePointer, SetLastError, SetThreadPriority, SetWaitableTimer, Sleep, SystemTimeToTzSpecificLocalTime, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WideCharToMultiByte, WriteFile
      OLE32.dllCoInitialize, CoUninitialize
      OPENGL32.DLLglBindTexture, glBlendFunc, glClear, glClearColor, glColor4f, glColorPointer, glCopyTexSubImage2D, glDeleteTextures, glDisable, glDisableClientState, glDrawArrays, glDrawElements, glDrawPixels, glEnable, glEnableClientState, glFlush, glGenTextures, glGetBooleanv, glGetError, glGetIntegerv, glGetString, glGetTexImage, glLoadIdentity, glLoadMatrixf, glMatrixMode, glMultMatrixf, glOrtho, glPixelStorei, glPixelTransferi, glPopClientAttrib, glPopMatrix, glPushClientAttrib, glPushMatrix, glRasterPos2f, glReadPixels, glScissor, glTexCoordPointer, glTexImage2D, glTexParameteri, glTexSubImage2D, glTranslatef, glVertexPointer, glViewport, wglCreateContext, wglDeleteContext, wglGetCurrentContext, wglGetCurrentDC, wglGetProcAddress, wglMakeCurrent
      PSAPI.DLLGetModuleFileNameExA
      SHELL32.DLLSHBrowseForFolderA, SHGetFolderPathA, SHGetPathFromIDListA, SHGetSpecialFolderPathA
      SHLWAPI.DLLPathFindOnPathA
      WINMM.DLLtimeBeginPeriod, timeEndPeriod, timeGetTime, waveInAddBuffer, waveInClose, waveInGetDevCapsA, waveInGetNumDevs, waveInOpen, waveInPrepareHeader, waveInReset, waveInStart, waveInStop, waveInUnprepareHeader, waveOutClose, waveOutGetDevCapsA, waveOutGetNumDevs, waveOutOpen, waveOutPrepareHeader, waveOutUnprepareHeader, waveOutWrite
      WS2_32.dllntohl
      NameOrdinalAddress
      AlphaBlend10x6469bd5c
      AppendCaptureDeviceList20x6469bcb4
      AppendDeviceList30x6469be04
      BytesFromDevFmt40x6469c18c
      BytesFromFmt50x64698068
      BytesFromUserFmt60x6469798c
      CLSID_DirectSound70x648038e0
      CLSID_DirectSound880x648038d0
      CLSID_DirectSoundCapture90x648038c0
      CLSID_DirectSoundCapture8100x648038b0
      CLSID_DirectSoundFullDuplex110x648038a0
      CalcNonAttnSourceParams120x6469dd24
      CalcSourceParams130x6469ebfc
      ChannelsFromDevFmt140x6469c1a8
      ChannelsFromFmt150x64698084
      ChannelsFromUserFmt160x646979a8
      CheckSupportedFolder170x64673934
      ConeScale180x647dd440
      ConfigValueExists190x646a8ae8
      CrcCalc200x646737b4
      CrcGenerateTable210x646736e8
      CrcUpdate220x64673784
      CreateRingBuffer230x64709b64
      DS3DALG_HRTF_FULL240x648036b0
      DS3DALG_HRTF_LIGHT250x648036a0
      DS3DALG_NO_VIRTUALIZATION260x648036c0
      DSDEVID_DefaultCapture270x64803880
      DSDEVID_DefaultPlayback280x64803890
      DSDEVID_DefaultVoiceCapture290x64803860
      DSDEVID_DefaultVoicePlayback300x64803870
      DSoundFuncs310x647dd5c0
      DSoundLoad320x646ab2c4
      DecomposeDevFormat330x6469c1c4
      DecomposeFormat340x646980a0
      DecomposeUserFormat350x646979c4
      DedicatedDLGCreate360x647059f4
      DedicatedLFECreate370x64705a6c
      DefaultResampler380x64878f34
      DestroyRingBuffer390x64709bcc
      DisabledEffects400x64878f38
      EAXVerbCreate410x647095cc
      EchoCreate420x64709a04
      EffectList430x648016c0
      FLAC_API_SUPPORTS_OGG_FLAC440x647dd680
      FLAC__ChannelAssignmentString450x64804d70
      FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_ESCAPE_PARAMETER460x64804dfc
      FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_PARAMETER_LEN470x64804e08
      FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_ESCAPE_PARAMETER480x64804e00
      FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_ORDER_LEN490x64804e10
      FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_PARAMETER_LEN500x64804e0c
      FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_RAW_LEN510x64804e04
      FLAC__ENTROPY_CODING_METHOD_TYPE_LEN520x64804e14
      FLAC__EntropyCodingMethodTypeString530x64804df4
      FLAC__FRAME_FOOTER_CRC_LEN540x64804e18
      FLAC__FRAME_HEADER_BITS_PER_SAMPLE_LEN550x64804e24
      FLAC__FRAME_HEADER_BLOCKING_STRATEGY_LEN560x64804e34
      FLAC__FRAME_HEADER_BLOCK_SIZE_LEN570x64804e30
      FLAC__FRAME_HEADER_CHANNEL_ASSIGNMENT_LEN580x64804e28
      FLAC__FRAME_HEADER_CRC_LEN590x64804e1c
      FLAC__FRAME_HEADER_RESERVED_LEN600x64804e38
      FLAC__FRAME_HEADER_SAMPLE_RATE_LEN610x64804e2c
      FLAC__FRAME_HEADER_SYNC620x64804e40
      FLAC__FRAME_HEADER_SYNC_LEN630x64804e3c
      FLAC__FRAME_HEADER_ZERO_PAD_LEN640x64804e20
      FLAC__FrameNumberTypeString650x64804d3c
      FLAC__MD5Accumulate660x64713880
      FLAC__MD5Final670x647137d4
      FLAC__MD5Init680x64713794
      FLAC__MetadataTypeString690x64804ce0
      FLAC__OGG_MAPPING_FIRST_HEADER_PACKET_TYPE700x64805370
      FLAC__OGG_MAPPING_MAGIC710x6480536c
      FLAC__OGG_MAPPING_NUM_HEADERS_LEN720x64805358
      FLAC__OGG_MAPPING_PACKET_TYPE_LEN730x64805374
      FLAC__OGG_MAPPING_VERSION_MAJOR_LEN740x64805360
      FLAC__OGG_MAPPING_VERSION_MINOR_LEN750x6480535c
      FLAC__STREAM_METADATA_APPLICATION_ID_LEN760x64804ecc
      FLAC__STREAM_METADATA_CUESHEET_INDEX_NUMBER_LEN770x64804ea4
      FLAC__STREAM_METADATA_CUESHEET_INDEX_OFFSET_LEN780x64804ea8
      FLAC__STREAM_METADATA_CUESHEET_INDEX_RESERVED_LEN790x64804ea0
      FLAC__STREAM_METADATA_CUESHEET_IS_CD_LEN800x64804e78
      FLAC__STREAM_METADATA_CUESHEET_LEAD_IN_LEN810x64804e7c
      FLAC__STREAM_METADATA_CUESHEET_MEDIA_CATALOG_NUMBER_LEN820x64804e80
      FLAC__STREAM_METADATA_CUESHEET_NUM_TRACKS_LEN830x64804e70
      FLAC__STREAM_METADATA_CUESHEET_RESERVED_LEN840x64804e74
      FLAC__STREAM_METADATA_CUESHEET_TRACK_ISRC_LEN850x64804e94
      FLAC__STREAM_METADATA_CUESHEET_TRACK_NUMBER_LEN860x64804e98
      FLAC__STREAM_METADATA_CUESHEET_TRACK_NUM_INDICES_LEN870x64804e84
      FLAC__STREAM_METADATA_CUESHEET_TRACK_OFFSET_LEN880x64804e9c
      FLAC__STREAM_METADATA_CUESHEET_TRACK_PRE_EMPHASIS_LEN890x64804e8c
      FLAC__STREAM_METADATA_CUESHEET_TRACK_RESERVED_LEN900x64804e88
      FLAC__STREAM_METADATA_CUESHEET_TRACK_TYPE_LEN910x64804e90
      FLAC__STREAM_METADATA_IS_LAST_LEN920x64804e4c
      FLAC__STREAM_METADATA_LENGTH_LEN930x64804e44
      FLAC__STREAM_METADATA_PICTURE_COLORS_LEN940x64804e54
      FLAC__STREAM_METADATA_PICTURE_DATA_LENGTH_LEN950x64804e50
      FLAC__STREAM_METADATA_PICTURE_DEPTH_LEN960x64804e58
      FLAC__STREAM_METADATA_PICTURE_DESCRIPTION_LENGTH_LEN970x64804e64
      FLAC__STREAM_METADATA_PICTURE_HEIGHT_LEN980x64804e5c
      FLAC__STREAM_METADATA_PICTURE_MIME_TYPE_LENGTH_LEN990x64804e68
      FLAC__STREAM_METADATA_PICTURE_TYPE_LEN1000x64804e6c
      FLAC__STREAM_METADATA_PICTURE_WIDTH_LEN1010x64804e60
      FLAC__STREAM_METADATA_SEEKPOINT_FRAME_SAMPLES_LEN1020x64804ec0
      FLAC__STREAM_METADATA_SEEKPOINT_PLACEHOLDER1030x64804eb8
      FLAC__STREAM_METADATA_SEEKPOINT_SAMPLE_NUMBER_LEN1040x64804ec8
      FLAC__STREAM_METADATA_SEEKPOINT_STREAM_OFFSET_LEN1050x64804ec4
      FLAC__STREAM_METADATA_STREAMINFO_BITS_PER_SAMPLE_LEN1060x64804ed8
      FLAC__STREAM_METADATA_STREAMINFO_CHANNELS_LEN1070x64804edc
      FLAC__STREAM_METADATA_STREAMINFO_MAX_BLOCK_SIZE_LEN1080x64804eec
      FLAC__STREAM_METADATA_STREAMINFO_MAX_FRAME_SIZE_LEN1090x64804ee4
      FLAC__STREAM_METADATA_STREAMINFO_MD5SUM_LEN1100x64804ed0
      FLAC__STREAM_METADATA_STREAMINFO_MIN_BLOCK_SIZE_LEN1110x64804ef0
      FLAC__STREAM_METADATA_STREAMINFO_MIN_FRAME_SIZE_LEN1120x64804ee8
      FLAC__STREAM_METADATA_STREAMINFO_SAMPLE_RATE_LEN1130x64804ee0
      FLAC__STREAM_METADATA_STREAMINFO_TOTAL_SAMPLES_LEN1140x64804ed4
      FLAC__STREAM_METADATA_TYPE_LEN1150x64804e48
      FLAC__STREAM_METADATA_VORBIS_COMMENT_ENTRY_LENGTH_LEN1160x64804eb0
      FLAC__STREAM_METADATA_VORBIS_COMMENT_NUM_COMMENTS_LEN1170x64804eac
      FLAC__STREAM_SYNC1180x64804ef8
      FLAC__STREAM_SYNC_LEN1190x64804ef4
      FLAC__STREAM_SYNC_STRING1200x64804efc
      FLAC__SUBFRAME_LPC_QLP_COEFF_PRECISION_LEN1210x64804dcc
      FLAC__SUBFRAME_LPC_QLP_SHIFT_LEN1220x64804dc8
      FLAC__SUBFRAME_TYPE_CONSTANT_BYTE_ALIGNED_MASK1230x64804db8
      FLAC__SUBFRAME_TYPE_FIXED_BYTE_ALIGNED_MASK1240x64804db0
      FLAC__SUBFRAME_TYPE_LEN1250x64804dc0
      FLAC__SUBFRAME_TYPE_LPC_BYTE_ALIGNED_MASK1260x64804dac
      FLAC__SUBFRAME_TYPE_VERBATIM_BYTE_ALIGNED_MASK1270x64804db4
      FLAC__SUBFRAME_WASTED_BITS_FLAG_LEN1280x64804dbc
      FLAC__SUBFRAME_ZERO_PAD_LEN1290x64804dc4
      FLAC__StreamDecoderErrorStatusString1300x6480417c
      FLAC__StreamDecoderInitStatusString1310x64804550
      FLAC__StreamDecoderLengthStatusString1320x6480426c
      FLAC__StreamDecoderReadStatusString1330x6480440c
      FLAC__StreamDecoderSeekStatusString1340x6480437c
      FLAC__StreamDecoderStateString1350x648046e0
      FLAC__StreamDecoderTellStatusString1360x648042f4
      FLAC__StreamDecoderWriteStatusString1370x648041e0
      FLAC__StreamMetadata_Picture_TypeString1380x64804c40
      FLAC__SubframeTypeString1390x64804d9c
      FLAC__VENDOR_STRING1400x647dd684
      FLAC__VERSION_STRING1410x647dd688
      FLAC__bitmath_ilog21420x64712f18
      FLAC__bitmath_ilog2_wide1430x64712f2c
      FLAC__bitmath_silog21440x64712f58
      FLAC__bitmath_silog2_wide1450x64712f7c
      FLAC__bitreader_bits_left_for_byte_alignment1460x64711094
      FLAC__bitreader_clear1470x64710df8
      FLAC__bitreader_delete1480x64710cd8
      FLAC__bitreader_dump1490x64710e20
      FLAC__bitreader_free1500x64710da4
      FLAC__bitreader_get_input_bits_unconsumed1510x647110a8
      FLAC__bitreader_get_read_crc161520x64711010
      FLAC__bitreader_init1530x64710d34
      FLAC__bitreader_is_consumed_byte_aligned1540x64711084
      FLAC__bitreader_new1550x64710cbc
      FLAC__bitreader_read_byte_block_aligned_no_crc1560x64711408
      FLAC__bitreader_read_raw_int321570x647110e4
      FLAC__bitreader_read_raw_uint321580x647110c0
      FLAC__bitreader_read_raw_uint641590x64711130
      FLAC__bitreader_read_rice_signed1600x64711808
      FLAC__bitreader_read_rice_signed_block1610x64711898
      FLAC__bitreader_read_uint32_little_endian1620x647111c4
      FLAC__bitreader_read_unary_unsigned1630x647114e8
      FLAC__bitreader_read_utf8_uint321640x64711e80
      FLAC__bitreader_read_utf8_uint641650x64712000
      FLAC__bitreader_reset_read_crc161660x64710ffc
      FLAC__bitreader_skip_bits_no_crc1670x6471125c
      FLAC__bitreader_skip_byte_block_aligned_no_crc1680x64711364
      FLAC__cpu_info1690x6471710c
      FLAC__crc161700x64710444
      FLAC__crc16_table1710x647dd6a0
      FLAC__crc81720x64710420
      FLAC__crc8_table1730x64804f40
      FLAC__crc8_update1740x647103dc
      FLAC__crc8_update_block1750x647103f4
      FLAC__fixed_compute_best_predictor1760x64712400
      FLAC__fixed_compute_best_predictor_wide1770x64712804
      FLAC__fixed_compute_residual1780x64712d6c
      FLAC__fixed_restore_signal1790x64712e48
      FLAC__format_cuesheet_is_legal1800x6470feb8
      FLAC__format_entropy_coding_method_partitioned_rice_contents_clear1810x6471031c
      FLAC__format_entropy_coding_method_partitioned_rice_contents_ensure_size1820x6471035c
      FLAC__format_entropy_coding_method_partitioned_rice_contents_init1830x64710300
      FLAC__format_get_max_rice_partition_order1840x64710268
      FLAC__format_get_max_rice_partition_order_from_blocksize1850x647102ac
      FLAC__format_get_max_rice_partition_order_from_blocksize_limited_max_and_predictor_order1860x647102d0
      FLAC__format_picture_is_legal1870x647101f8
      FLAC__format_sample_rate_is_subset1880x6470fc44
      FLAC__format_sample_rate_is_valid1890x6470fc30
      FLAC__format_seektable_is_legal1900x6470fc88
      FLAC__format_seektable_sort1910x6470fcec
      FLAC__format_vorbiscomment_entry_is_legal1920x6470fe50
      FLAC__format_vorbiscomment_entry_name_is_legal1930x6470fdc8
      FLAC__format_vorbiscomment_entry_value_is_legal1940x6470fdf4
      FLAC__lpc_compute_autocorrelation1950x64713dbc
      FLAC__lpc_compute_best_order1960x64716fe0
      FLAC__lpc_compute_expected_bits_per_residual_sample1970x64716ed0
      FLAC__lpc_compute_expected_bits_per_residual_sample_with_error_scale1980x64716f60
      FLAC__lpc_compute_lp_coefficients1990x64713e5c
      FLAC__lpc_compute_residual_from_qlp_coefficients2000x647141d8
      FLAC__lpc_compute_residual_from_qlp_coefficients_wide2010x64714900
      FLAC__lpc_quantize_coefficients2020x64713fac
      FLAC__lpc_restore_signal2030x64715870
      FLAC__lpc_restore_signal_wide2040x64715f80
      FLAC__lpc_window_data2050x64713d90
      FLAC__memory_alloc_aligned2060x64712200
      FLAC__memory_alloc_aligned_int32_array2070x64712220
      FLAC__memory_alloc_aligned_real_array2080x647123a0
      FLAC__memory_alloc_aligned_uint32_array2090x64712280
      FLAC__memory_alloc_aligned_uint64_array2100x647122e0
      FLAC__memory_alloc_aligned_unsigned_array2110x64712340
      FLAC__ogg_decoder_aspect_finish2120x647104f4
      FLAC__ogg_decoder_aspect_flush2130x6471053c
      FLAC__ogg_decoder_aspect_init2140x64710480
      FLAC__ogg_decoder_aspect_read_callback_wrapper2150x647105c4
      FLAC__ogg_decoder_aspect_reset2160x64710578
      FLAC__ogg_decoder_aspect_set_defaults2170x64710530
      FLAC__ogg_decoder_aspect_set_serial_number2180x6471051c
      FLAC__stream_decoder_delete2190x6470d7c8
      FLAC__stream_decoder_finish2200x6470d3f8
      FLAC__stream_decoder_flush2210x6470dcb4
      FLAC__stream_decoder_get_bits_per_sample2220x6470dc10
      FLAC__stream_decoder_get_blocksize2230x6470dc28
      FLAC__stream_decoder_get_channel_assignment2240x6470dc04
      FLAC__stream_decoder_get_channels2250x6470dbf8
      FLAC__stream_decoder_get_decode_position2260x6470dc34
      FLAC__stream_decoder_get_input_bytes_unconsumed2270x6470f9a4
      FLAC__stream_decoder_get_md5_checking2280x6470dbc4
      FLAC__stream_decoder_get_resolved_state_string2290x6470dbb4
      FLAC__stream_decoder_get_sample_rate2300x6470dc1c
      FLAC__stream_decoder_get_state2310x6470dba8
      FLAC__stream_decoder_get_total_samples2320x6470dbd0
      FLAC__stream_decoder_init_FILE2330x6470e0bc
      FLAC__stream_decoder_init_file2340x6470e344
      FLAC__stream_decoder_init_ogg_FILE2350x6470e44c
      FLAC__stream_decoder_init_ogg_file2360x6470e23c
      FLAC__stream_decoder_init_ogg_stream2370x6470e194
      FLAC__stream_decoder_init_stream2380x6470e1e8
      FLAC__stream_decoder_new2390x6470d1a0
      FLAC__stream_decoder_process_single2400x6470e524
      FLAC__stream_decoder_process_until_end_of_metadata2410x6470e618
      FLAC__stream_decoder_process_until_end_of_stream2420x6470e668
      FLAC__stream_decoder_reset2430x6470dd28
      FLAC__stream_decoder_seek_absolute2440x6470e824
      FLAC__stream_decoder_set_md5_checking2450x6470d8d0
      FLAC__stream_decoder_set_metadata_ignore2460x6470da48
      FLAC__stream_decoder_set_metadata_ignore_all2470x6470db68
      FLAC__stream_decoder_set_metadata_ignore_application2480x6470da90
      FLAC__stream_decoder_set_metadata_respond2490x6470d8f0
      FLAC__stream_decoder_set_metadata_respond_all2500x6470da10
      FLAC__stream_decoder_set_metadata_respond_application2510x6470d938
      FLAC__stream_decoder_set_ogg_serial_number2520x6470d8a0
      FLAC__stream_decoder_skip_single_frame2530x6470e74c
      FT_Activate_Size2540x6476b7a8
      FT_Add_Default_Modules2550x64774730
      FT_Add_Module2560x6476bae8
      FT_Alloc2570x647744d8
      FT_Angle_Diff2580x647738a8
      FT_Atan22590x647731bc
      FT_Attach_File2600x64769968
      FT_Attach_Stream2610x64769a6c
      FT_CMap_Done2620x64773ff0
      FT_CMap_New2630x64773e98
      FT_CeilFix2640x64767f74
      FT_Cos2650x64773064
      FT_DivFix2660x647682fc
      FT_Done_Face2670x64769b70
      FT_Done_FreeType2680x647747d8
      FT_Done_GlyphSlot2690x64769860
      FT_Done_Library2700x6476c124
      FT_Done_Memory2710x647749d4
      FT_Done_Size2720x64769d84
      FT_Face_GetCharVariantIndex2730x6476b064
      FT_Face_GetCharVariantIsDefault2740x6476b138
      FT_Face_GetCharsOfVariant2750x6476b36c
      FT_Face_GetVariantSelectors2760x6476b1f8
      FT_Face_GetVariantsOfChar2770x6476b2ac
      FT_FloorFix2780x64767f98
      FT_Free2790x64774708
      FT_Get_Advance2800x6476daa4
      FT_Get_Advances2810x6476d8dc
      FT_Get_CMap_Format2820x6476b750
      FT_Get_CMap_Language_ID2830x6476b6fc
      FT_Get_Char_Index2840x6476af50
      FT_Get_Charmap_Index2850x6476af0c
      FT_Get_First_Char2860x6476af70
      FT_Get_Glyph_Name2870x6476b4a4
      FT_Get_Kerning2880x6476ab7c
      FT_Get_Module2890x6476be5c
      FT_Get_Module_Interface2900x6476beb8
      FT_Get_Name_Index2910x6476b42c
      FT_Get_Next_Char2920x6476b000
      FT_Get_Postscript_Name2930x6476b54c
      FT_Get_Renderer2940x6476b818
      FT_Get_Sfnt_Name2950x6476f55c
      FT_Get_Sfnt_Name_Count2960x6476f3d0
      FT_Get_Sfnt_Table2970x6476b5b4
      FT_Get_SubGlyph_Info2980x6476c47c
      FT_Get_Track_Kerning2990x6476acf0
      FT_Get_TrueType_Engine_Type3000x6476c2ec
      FT_GlyphLoader_Add3010x647693dc
      FT_GlyphLoader_CheckPoints3020x64773b3c
      FT_GlyphLoader_CheckSubGlyphs3030x64773ac0
      FT_GlyphLoader_CopyPoints3040x64773d3c
      FT_GlyphLoader_CreateExtra3050x647692bc
      FT_GlyphLoader_Done3060x64769294
      FT_GlyphLoader_New3070x64768ce8
      FT_GlyphLoader_Prepare3080x6476937c
      FT_GlyphLoader_Reset3090x64768d58
      FT_GlyphLoader_Rewind3100x64768d2c
      FT_Init_FreeType3110x64774760
      FT_Library_Version3120x6476c0e4
      FT_List_Add3130x64774364
      FT_List_Finalize3140x6477444c
      FT_List_Find3150x6477433c
      FT_List_Insert3160x6477438c
      FT_List_Iterate3170x6477440c
      FT_List_Remove3180x647743b0
      FT_List_Up3190x647743d8
      FT_Load_Char3200x6476d88c
      FT_Load_Glyph3210x6476d868
      FT_Load_Sfnt_Table3220x6476b604
      FT_Lookup_Renderer3230x6476b7cc
      FT_Match_Size3240x64769eac
      FT_Matrix_Invert3250x6476851c
      FT_Matrix_Multiply3260x647683bc
      FT_Matrix_Multiply_Scaled3270x64768880
      FT_MulDiv3280x64768194
      FT_MulDiv_No_Round3290x647681b4
      FT_MulFix3300x647682d8
      FT_New_Face3310x64772564
      FT_New_GlyphSlot3320x647696c8
      FT_New_Library3330x6476c018
      FT_New_Memory3340x647749a0
      FT_New_Memory_Face3350x64772508
      FT_New_Size3360x64769c04
      FT_Open_Face3370x647708a4
      FT_Outline_Check3380x6476cc30
      FT_Outline_Copy3390x6476cc98
      FT_Outline_Decompose3400x6476c4f4
      FT_Outline_Done3410x6476cd88
      FT_Outline_Done_Internal3420x6476cd00
      FT_Outline_Embolden3430x6476e08c
      FT_Outline_Get_Bitmap3440x6476d09c
      FT_Outline_Get_CBox3450x6476ce20
      FT_Outline_Get_Orientation3460x6476db78
      FT_Outline_New3470x6476cc10
      FT_Outline_New_Internal3480x6476ca28
      FT_Outline_Render3490x6476cf98
      FT_Outline_Reverse3500x6476ceec
      FT_Outline_Transform3510x6476d1b0
      FT_Outline_Translate3520x6476ceb4
      FT_QAlloc3530x64774544
      FT_QRealloc3540x6477465c
      FT_Raccess_Get_DataOffsets3550x6476e78c
      FT_Raccess_Get_HeaderInfo3560x6476fb64
      FT_Raccess_Guess3570x6476ed68
      FT_Realloc3580x6477458c
      FT_Reference_Face3590x64769b60
      FT_Reference_Library3600x6476c008
      FT_Remove_Module3610x6476bf90
      FT_Render_Glyph3620x6476baac
      FT_Render_Glyph_Internal3630x6476b948
      FT_Request_Metrics3640x6476a270
      FT_Request_Size3650x6476a81c
      FT_RoundFix3660x64767f50
      FT_Select_Charmap3670x6476ad78
      FT_Select_Metrics3680x6476a08c
      FT_Select_Size3690x6476a7bc
      FT_Set_Char_Size3700x6476a8f8
      FT_Set_Charmap3710x6476ae60
      FT_Set_Debug_Hook3720x6476c2c8
      FT_Set_Pixel_Sizes3730x6476aa28
      FT_Set_Renderer3740x6476b84c
      FT_Set_Transform3750x647698c0
      FT_Sfnt_Table_Info3760x6476b68c
      FT_Sin3770x647730a0
      FT_Sqrt323780x64767fb4
      FT_SqrtFixed3790x64768b0c
      FT_Stream_Close3800x6476f41c
      FT_Stream_EnterFrame3810x6476f7ec
      FT_Stream_ExitFrame3820x6476f910
      FT_Stream_ExtractFrame3830x6476f8d8
      FT_Stream_Free3840x64769544
      FT_Stream_GetChar3850x6476f94c
      FT_Stream_GetULong3860x6476f9f4
      FT_Stream_GetULongLE3870x6476fa34
      FT_Stream_GetUOffset3880x6476f9bc
      FT_Stream_GetUShort3890x6476f964
      FT_Stream_GetUShortLE3900x6476f990
      FT_Stream_New3910x64769514
      FT_Stream_Open3920x647748cc
      FT_Stream_OpenGzip3930x647bcf18
      FT_Stream_OpenLZW3940x647bd714
      FT_Stream_OpenMemory3950x6476f3ec
      FT_Stream_Pos3960x6476f4d8
      FT_Stream_Read3970x6476f4e0
      FT_Stream_ReadAt3980x6476f6c8
      FT_Stream_ReadChar3990x6476fa74
      FT_Stream_ReadFields4000x64772e40
      FT_Stream_ReadULong4010x647726c0
      FT_Stream_ReadULongLE4020x64772dac
      FT_Stream_ReadUOffset4030x64772638
      FT_Stream_ReadUShort4040x6476fae4
      FT_Stream_ReadUShortLE4050x647725b8
      FT_Stream_ReleaseFrame4060x6476f7b4
      FT_Stream_Seek4070x6476f434
      FT_Stream_Skip4080x6476f480
      FT_Stream_TryRead4090x6476f74c
      FT_Tan4100x647730e0
      FT_Vector_From_Polar4110x64773888
      FT_Vector_Length4120x64773510
      FT_Vector_Polarize4130x647736d4
      FT_Vector_Rotate4140x647732ac
      FT_Vector_Transform4150x6476d0fc
      FT_Vector_Transform_Scaled4160x64768a38
      FT_Vector_Unit4170x64773284
      FreeALConfig4180x646a896c
      GUID_All_Objects4190x64803800
      GUID_DSCFX_CLASS_AEC4200x64803600
      GUID_DSCFX_CLASS_NS4210x648035d0
      GUID_DSCFX_MS_AEC4220x648035f0
      GUID_DSCFX_MS_NS4230x648035c0
      GUID_DSCFX_SYSTEM_AEC4240x648035e0
      GUID_DSCFX_SYSTEM_NS4250x648035b0
      GUID_DSFX_STANDARD_CHORUS4260x64803680
      GUID_DSFX_STANDARD_COMPRESSOR4270x64803640
      GUID_DSFX_STANDARD_DISTORTION4280x64803650
      GUID_DSFX_STANDARD_ECHO4290x64803660
      GUID_DSFX_STANDARD_FLANGER4300x64803670
      GUID_DSFX_STANDARD_GARGLE4310x64803690
      GUID_DSFX_STANDARD_I3DL2REVERB4320x64803620
      GUID_DSFX_STANDARD_PARAMEQ4330x64803630
      GUID_DSFX_WAVES_REVERB4340x64803610
      GUID_NULL4350x647e44a4
      GetConfigValue4360x646a8a08
      GetConfigValueBool4370x646a8dd4
      GetConfigValueFloat4380x646a8cd8
      GetConfigValueInt4390x646a8bd0
      GetContextSuspended4400x6469cd30
      GetSum4410x64673ae0
      IID_IAdviseSink4420x64814708
      IID_IAdviseSink24430x64814718
      IID_IBindCtx4440x648147c8
      IID_IClassActivator4450x64814848
      IID_IClassFactory4460x64814668
      IID_IClientSecurity4470x64814878
      IID_IDataAdviseHolder4480x64814738
      IID_IDataObject4490x64814728
      IID_IDirectSound4500x64803840
      IID_IDirectSound3DBuffer4510x648037e0
      IID_IDirectSound3DListener4520x648037f0
      IID_IDirectSound84530x64803830
      IID_IDirectSoundBuffer4540x64803820
      IID_IDirectSoundBuffer84550x64803810
      IID_IDirectSoundCapture4560x648037d0
      IID_IDirectSoundCaptureBuffer4570x648037c0
      IID_IDirectSoundCaptureBuffer84580x648037b0
      IID_IDirectSoundCaptureFXAec4590x648036f0
      IID_IDirectSoundCaptureFXNoiseSuppress4600x648036e0
      IID_IDirectSoundFXChorus4610x64803770
      IID_IDirectSoundFXCompressor4620x64803730
      IID_IDirectSoundFXDistortion4630x64803740
      IID_IDirectSoundFXEcho4640x64803750
      IID_IDirectSoundFXFlanger4650x64803760
      IID_IDirectSoundFXGargle4660x64803780
      IID_IDirectSoundFXI3DL2Reverb4670x64803710
      IID_IDirectSoundFXParamEq4680x64803720
      IID_IDirectSoundFXWavesReverb4690x64803700
      IID_IDirectSoundFullDuplex4700x648036d0
      IID_IDirectSoundNotify4710x648037a0
      IID_IExternalConnection4720x648147f8
      IID_IFillLockBytes4730x64814858
      IID_IKsPropertySet4740x64803790
      IID_ILockBytes4750x648147e8
      IID_IMalloc4760x64814698
      IID_IMallocSpy4770x64814888
      IID_IMarshal4780x64814678
      IID_IMessageFilter4790x648146a8
      IID_IMoniker4800x648146f8
      IID_IPSFactoryBuffer4810x648147d8
      IID_IPersist4820x648146b8
      IID_IPersistFile4830x648146c8
      IID_IPersistStorage4840x648146d8
      IID_IPersistStream4850x648146e8
      IID_IProgressNotify4860x64814868
      IID_IPropertySetStorage4870x64814828
      IID_IPropertyStorage4880x64814838
      IID_IROTData4890x64814818
      IID_IReferenceClock4900x64803850
      IID_IRootStorage4910x64814758
      IID_IRpcChannelBuffer4920x64814768
      IID_IRpcProxyBuffer4930x64814778
      IID_IRpcStubBuffer4940x64814788
      IID_IRunnableObject4950x64814808
      IID_IRunningObjectTable4960x648147b8
      IID_ISequentialStream4970x64814798
      IID_IServerSecurity4980x64814898
      IID_IStdMarshalInfo4990x648147a8
      IID_IStorage5000x64814748
      IID_IStream5010x64814688
      IID_IUnknown5020x64814658
      InitUIntMap5030x6469bf0c
      InsertUIntMapEntry5040x6469bf54
      IsValidChannels5050x6469cc94
      IsValidType5060x6469cc78
      KSDATAFORMAT_SUBTYPE_IEEE_FLOAT5070x64803590
      KSDATAFORMAT_SUBTYPE_PCM5080x648035a0
      LookupUIntMapKey5090x6469c120
      LzmaDecode5100x6467f3f4
      LzmaDecodeProperties5110x6467f394
      MixSource5120x646f66a8
      ModulatorCreate5130x64705f2c
      NoneCreate5140x646a6c0c
      PHYSFS_addToSearchPath5150x64681e90
      PHYSFS_close5160x64683fb4
      PHYSFS_deinit5170x64681b78
      PHYSFS_delete5180x64682588
      PHYSFS_enumerateFiles5190x64682dc8
      PHYSFS_enumerateFilesCallback5200x64682b30
      PHYSFS_eof5210x646842e4
      PHYSFS_exists5220x6468348c
      PHYSFS_fileLength5230x646844fc
      PHYSFS_flush5240x64684654
      PHYSFS_freeList5250x6468199c
      PHYSFS_getBaseDir5260x64681a68
      PHYSFS_getCdRomDirs5270x646819dc
      PHYSFS_getCdRomDirsCallback5280x64681a60
      PHYSFS_getDirSeparator5290x646819d4
      PHYSFS_getLastError5300x646813ec
      PHYSFS_getLastModTime5310x646834a8
      PHYSFS_getLinkedVersion5320x64681474
      PHYSFS_getMountPoint5330x6468210c
      PHYSFS_getRealDir5340x64682794
      PHYSFS_getSearchPath5350x6468204c
      PHYSFS_getSearchPathCallback5360x64680420
      PHYSFS_getUserDir5370x64681a70
      PHYSFS_getWriteDir5380x64681a78
      PHYSFS_init5390x64681488
      PHYSFS_isDirectory5400x646837b0
      PHYSFS_isInit5410x6468198c
      PHYSFS_isSymbolicLink5420x64683a68
      PHYSFS_mkdir5430x6468231c
      PHYSFS_mount5440x64681dc4
      PHYSFS_openAppend5450x64683d30
      PHYSFS_openRead5460x64683d40
      PHYSFS_openWrite5470x64683d24
      PHYSFS_permitSymbolicLinks5480x64682198
      PHYSFS_read5490x64684050
      PHYSFS_readSBE165500x64684918
      PHYSFS_readSBE325510x64684ae0
      PHYSFS_readSBE645520x64684cc8
      PHYSFS_readSLE165530x64684838
      PHYSFS_readSLE325540x64684a00
      PHYSFS_readSLE645550x64684bd8
      PHYSFS_readUBE165560x6468498c
      PHYSFS_readUBE325570x64684b5c
      PHYSFS_readUBE645580x64684d54
      PHYSFS_readULE165590x646848a8
      PHYSFS_readULE325600x64684a70
      PHYSFS_readULE645610x64684c50
      PHYSFS_removeFromSearchPath5620x64681f48
      PHYSFS_seek5630x6468436c
      PHYSFS_setAllocator5640x646846c4
      PHYSFS_setBuffer5650x64684510
      PHYSFS_setSaneConfig5660x64682e3c
      PHYSFS_setWriteDir5670x64681ab0
      PHYSFS_supportedArchiveTypes5680x64681994
      PHYSFS_swapSBE165690x646847cc
      PHYSFS_swapSBE325700x646847e8
      PHYSFS_swapSBE645710x64684818
      PHYSFS_swapSLE165720x64684790
      PHYSFS_swapSLE325730x646847a0
      PHYSFS_swapSLE645740x646847b4
      PHYSFS_swapUBE165750x646847c0
      PHYSFS_swapUBE325760x646847d8
      PHYSFS_swapUBE645770x646847f8
      PHYSFS_swapULE165780x64684788
      PHYSFS_swapULE325790x64684798
      PHYSFS_swapULE645800x646847a8
      PHYSFS_symbolicLinksPermitted5810x646821a4
      PHYSFS_tell5820x64684318
      PHYSFS_utf8FromLatin15830x646857e8
      PHYSFS_utf8FromUcs25840x64685788
      PHYSFS_utf8FromUcs45850x64685728
      PHYSFS_utf8ToUcs25860x646856c8
      PHYSFS_utf8ToUcs45870x64685670
      PHYSFS_write5880x646841e4
      PHYSFS_writeSBE165890x64684e90
      PHYSFS_writeSBE325900x64684ff0
      PHYSFS_writeSBE645910x64685168
      PHYSFS_writeSLE165920x64684de0
      PHYSFS_writeSLE325930x64684f48
      PHYSFS_writeSLE645940x646850b0
      PHYSFS_writeUBE165950x64684eec
      PHYSFS_writeUBE325960x64685050
      PHYSFS_writeUBE645970x646851dc
      PHYSFS_writeULE165980x64684e38
      PHYSFS_writeULE325990x64684f9c
      PHYSFS_writeULE646000x6468510c
      ProcessContext6010x6469cd1c
      ReadALConfig6020x646a8860
      ReadRingBuffer6030x64709cd8
      ReleaseALAuxiliaryEffectSlots6040x646a6c48
      ReleaseALBuffers6050x64698c50
      ReleaseALDatabuffers6060x646a8238
      ReleaseALEffects6070x646a5fac
      ReleaseALFilters6080x646a7584
      ReleaseALSources6090x646903ac
      RemoveUIntMapKey6100x6469c07c
      ResamplerPadding6110x647ff534
      ResamplerPrePadding6120x647ff528
      ResetUIntMap6130x6469bf28
      RingBufferSize6140x64709c04
      SafeReadDirect6150x64674668
      SafeReadDirectByte6160x646746a4
      SafeReadDirectUInt326170x646746e0
      SafeReadDirectUInt646180x64674834
      SetDefaultChannelOrder6190x6469cde0
      SetDefaultWFXChannelOrder6200x6469cf28
      SetRTPriority6210x6469beac
      StartThread6220x64709a98
      StopThread6230x64709b08
      SuspendContext6240x6469cd08
      SzArDbExFill6250x646743c8
      SzArDbExFree6260x64674364
      SzArDbExInit6270x64674330
      SzArDbGetFolderFullPackSize6280x646745ec
      SzArDbGetFolderStreamPos6290x646745c8
      SzArchiveDatabaseFree6300x6467ec50
      SzArchiveDatabaseInit6310x6467ec14
      SzArchiveOpen6320x6467e8f0
      SzArchiveOpen26330x6467e454
      SzByteBufferCreate6340x646737fc
      SzByteBufferFree6350x64673834
      SzByteBufferInit6360x646737e8
      SzCoderInfoFree6370x6467e98c
      SzCoderInfoInit6380x6467e980
      SzDecode6390x64673f40
      SzDecode26400x64673b08
      SzDecodeLzma6410x64673858
      SzExtract6420x64673fc4
      SzFileFree6430x6467ebe0
      SzFileInit6440x6467ebc0
      SzFileReadImp6450x6466e298
      SzFileSeekImp6460x6466e2d4
      SzFolderFindBindPairForInStream6470x6467eae8
      SzFolderFindBindPairForOutStream6480x6467eb18
      SzFolderFree6490x6467ea00
      SzFolderGetNumOutStreams6500x6467eac0
      SzFolderGetUnPackSize6510x6467eb48
      SzFolderInit6520x6467e9b4
      SzGetNextFolderItem6530x64677c74
      SzReadAndDecodePackedStreams6540x6467e370
      SzReadAndDecodePackedStreams26550x6467e158
      SzReadArchiveProperties6560x6467594c
      SzReadBoolVector6570x646766c0
      SzReadBoolVector26580x64676764
      SzReadByte6590x64674b60
      SzReadBytes6600x64674b8c
      SzReadFileNames6610x6467c880
      SzReadHashDigests6620x64676838
      SzReadHeader6630x6467e084
      SzReadHeader26640x6467cb64
      SzReadID6650x64675404
      SzReadNumber6660x64674c5c
      SzReadNumber326670x64675180
      SzReadPackInfo6680x64676a14
      SzReadSize6690x64674f14
      SzReadStreamsInfo6700x6467c44c
      SzReadSubStreamsInfo6710x6467a680
      SzReadSwitch6720x64677c48
      SzReadUInt326730x64674bd8
      SzReadUnPackInfo6740x646799c8
      SzSkeepData6750x646756e4
      SzSkeepDataSize6760x646756bc
      SzWaitAttribute6770x64675f9c
      TT_New_Context6780x6478679c
      TT_RunIns6790x64783f28
      TestSignatureCandidate6800x64674b10
      VerbCreate6810x64709274
      WriteRingBuffer6820x64709c3c
      _Unwind_Backtrace6830x6468b238
      _Unwind_DeleteException6840x6468b218
      _Unwind_FindEnclosingFunction6850x6468ad70
      _Unwind_Find_FDE6860x6468d0d0
      _Unwind_ForcedUnwind6870x6468b030
      _Unwind_GetCFA6880x6468ace4
      _Unwind_GetDataRelBase6890x6468ad98
      _Unwind_GetGR6900x6468aca4
      _Unwind_GetIP6910x6468ad38
      _Unwind_GetIPInfo6920x6468ad40
      _Unwind_GetLanguageSpecificData6930x6468ad60
      _Unwind_GetRegionStart6940x6468ad68
      _Unwind_GetTextRelBase6950x6468ada0
      _Unwind_RaiseException6960x6468ae7c
      _Unwind_Resume6970x6468b0d0
      _Unwind_Resume_or_Rethrow6980x6468b170
      _Unwind_SetGR6990x6468acec
      _Unwind_SetIP7000x6468ad54
      _WinMain7010x64668e84
      _Z25_al_d3d_prepare_for_resetP19ALLEGRO_DISPLAY_D3D7020x6465efec
      _Z25_al_save_gdiplus_bitmap_fP12ALLEGRO_FILEPKcP14ALLEGRO_BITMAP7030x645d1c2c
      _Z47_al_d3d_get_current_ortho_projection_parametersPfS_7040x6465ee5c
      _ZN20AllegroWindowsStream10LockRegionE15_ULARGE_INTEGERS0_m@247050x647d4ae8
      _ZN20AllegroWindowsStream12UnlockRegionE15_ULARGE_INTEGERS0_m@247060x647d4af0
      _ZN20AllegroWindowsStream14QueryInterfaceERK5_GUIDPPv@127070x647d4af8
      _ZN20AllegroWindowsStream4ReadEPvmPm@167080x647d4b84
      _ZN20AllegroWindowsStream4SeekE14_LARGE_INTEGERmP15_ULARGE_INTEGER@207090x647d4bc4
      _ZN20AllegroWindowsStream4StatEP10tagSTATSTGm@127100x647d4c40
      _ZN20AllegroWindowsStream5CloneEPP7IStream@87110x647d4c7c
      _ZN20AllegroWindowsStream5WriteEPKvmPm@167120x647d4c84
      _ZN20AllegroWindowsStream6AddRefEv@47130x647d4cc8
      _ZN20AllegroWindowsStream6CommitEm@87140x647d4cd4
      _ZN20AllegroWindowsStream6CopyToEP7IStream15_ULARGE_INTEGERPS2_S3_@247150x647d4cdc
      _ZN20AllegroWindowsStream6RevertEv@47160x647d4ce4
      _ZN20AllegroWindowsStream7ReleaseEv@47170x647d4cec
      _ZN20AllegroWindowsStream7SetSizeE15_ULARGE_INTEGER@127180x647d4d20
      _ZN20AllegroWindowsStreamD0Ev7190x647d4d28
      _ZN20AllegroWindowsStreamD1Ev7200x647d4d40
      _ZN7Gdiplus12CachedBitmapD0Ev7210x647d4d48
      _ZN7Gdiplus12CachedBitmapD1Ev7220x647d4d70
      _ZN7Gdiplus13CustomLineCapD0Ev7230x647d4d8c
      _ZN7Gdiplus13CustomLineCapD1Ev7240x647d4db4
      _ZN7Gdiplus14FontCollectionD0Ev7250x647d4dd0
      _ZN7Gdiplus14FontCollectionD1Ev7260x647d4de8
      _ZN7Gdiplus21PrivateFontCollectionD0Ev7270x647d4df0
      _ZN7Gdiplus21PrivateFontCollectionD1Ev7280x647d4e2c
      _ZN7Gdiplus23InstalledFontCollectionD0Ev7290x647d4e60
      _ZN7Gdiplus23InstalledFontCollectionD1Ev7300x647d4e78
      _ZN7Gdiplus5Image5CloneEv7310x647d4e80
      _ZN7Gdiplus5ImageD0Ev7320x647d4ed0
      _ZN7Gdiplus5ImageD1Ev7330x647d4ef8
      _ZN7Gdiplus6BitmapD0Ev7340x647d4f14
      _ZN7Gdiplus6BitmapD1Ev7350x647d4f3c
      _ZTI17ISequentialStream7360x64830c00
      _ZTI20AllegroWindowsStream7370x64830c0c
      _ZTI7IStream7380x64830c18
      _ZTI8IUnknown7390x64830c24
      _ZTIN7Gdiplus11GdiplusBaseE7400x64830c54
      _ZTIN7Gdiplus12CachedBitmapE7410x64830c5c
      _ZTIN7Gdiplus13CustomLineCapE7420x64830c68
      _ZTIN7Gdiplus14FontCollectionE7430x64830c74
      _ZTIN7Gdiplus21PrivateFontCollectionE7440x64830c80
      _ZTIN7Gdiplus23InstalledFontCollectionE7450x64830c8c
      _ZTIN7Gdiplus5ImageE7460x64830c98
      _ZTIN7Gdiplus6BitmapE7470x64830ca4
      _ZTS17ISequentialStream7480x64830cfc
      _ZTS20AllegroWindowsStream7490x64830d10
      _ZTS7IStream7500x64830d28
      _ZTS8IUnknown7510x64830d34
      _ZTSN7Gdiplus11GdiplusBaseE7520x64830e20
      _ZTSN7Gdiplus12CachedBitmapE7530x64830e38
      _ZTSN7Gdiplus13CustomLineCapE7540x64830e54
      _ZTSN7Gdiplus14FontCollectionE7550x64830e70
      _ZTSN7Gdiplus21PrivateFontCollectionE7560x64830ea0
      _ZTSN7Gdiplus23InstalledFontCollectionE7570x64830ee0
      _ZTSN7Gdiplus5ImageE7580x64830f20
      _ZTSN7Gdiplus6BitmapE7590x64830f34
      _ZTV17ISequentialStream7600x64831068
      _ZTV20AllegroWindowsStream7610x648310a0
      _ZTV7IStream7620x64831100
      _ZTV8IUnknown7630x64831140
      _ZTVN7Gdiplus12CachedBitmapE7640x64831220
      _ZTVN7Gdiplus13CustomLineCapE7650x64831230
      _ZTVN7Gdiplus14FontCollectionE7660x64831240
      _ZTVN7Gdiplus21PrivateFontCollectionE7670x64831250
      _ZTVN7Gdiplus23InstalledFontCollectionE7680x64831260
      _ZTVN7Gdiplus5ImageE7690x64831270
      _ZTVN7Gdiplus6BitmapE7700x64831288
      __PHYSFS_AllocatorHooks7710x64878f20
      __PHYSFS_ArchiveInfo_DIR7720x647f93bc
      __PHYSFS_ArchiveInfo_GRP7730x647f9538
      __PHYSFS_ArchiveInfo_HOG7740x647f9694
      __PHYSFS_ArchiveInfo_LZMA7750x647f982c
      __PHYSFS_ArchiveInfo_MVL7760x647f9970
      __PHYSFS_ArchiveInfo_QPAK7770x647f9acc
      __PHYSFS_ArchiveInfo_WAD7780x647f9c0c
      __PHYSFS_ArchiveInfo_ZIP7790x647f9edc
      __PHYSFS_Archiver_DIR7800x647f9300
      __PHYSFS_Archiver_GRP7810x647f9480
      __PHYSFS_Archiver_HOG7820x647f95e0
      __PHYSFS_Archiver_LZMA7830x647f9780
      __PHYSFS_Archiver_MVL7840x647f98c0
      __PHYSFS_Archiver_QPAK7850x647f9a20
      __PHYSFS_Archiver_WAD7860x647f9b60
      __PHYSFS_Archiver_ZIP7870x647f9e20
      __PHYSFS_convertToDependent7880x646821ac
      __PHYSFS_initSmallAlloc7890x64684724
      __PHYSFS_platformCalcBaseDir7900x64686c94
      __PHYSFS_platformClose7910x646884b0
      __PHYSFS_platformCreateMutex7920x646885d8
      __PHYSFS_platformCurrentDir7930x6468778c
      __PHYSFS_platformCvtToDependent7940x6468714c
      __PHYSFS_platformDeinit7950x6468809c
      __PHYSFS_platformDelete7960x646884f0
      __PHYSFS_platformDestroyMutex7970x64688600
      __PHYSFS_platformDetectAvailableCDs7980x64686bdc
      __PHYSFS_platformDirSeparator7990x647dd410
      __PHYSFS_platformEOF8000x646883b0
      __PHYSFS_platformEnumerateFiles8010x6468724c
      __PHYSFS_platformExists8020x64686eb4
      __PHYSFS_platformFileLength8030x6468835c
      __PHYSFS_platformFlush8040x64688474
      __PHYSFS_platformGetLastModTime8050x64688650
      __PHYSFS_platformGetThreadID8060x64686ea4
      __PHYSFS_platformGetUserDir8070x64686e4c
      __PHYSFS_platformGetUserName8080x64686cc4
      __PHYSFS_platformGrabMutex8090x64688614
      __PHYSFS_platformInit8100x64687c10
      __PHYSFS_platformIsDirectory8110x64687098
      __PHYSFS_platformIsSymLink8120x64686f80
      __PHYSFS_platformMkDir8130x64687b50
      __PHYSFS_platformOpenAppend8140x6468813c
      __PHYSFS_platformOpenRead8150x64688104
      __PHYSFS_platformOpenWrite8160x64688120
      __PHYSFS_platformRead8170x646881bc
      __PHYSFS_platformRealPath8180x64687904
      __PHYSFS_platformReleaseMutex8190x6468863c
      __PHYSFS_platformSeek8200x64688294
      __PHYSFS_platformSetDefaultAllocator8210x64688900
      __PHYSFS_platformTell8220x646882f8
      __PHYSFS_platformWrite8230x64688228
      __PHYSFS_setError8240x646808c4
      __PHYSFS_smallFree8250x6468476c
      __PHYSFS_sort8260x646808a4
      __PHYSFS_stricmpASCII8270x64685a04
      __PHYSFS_strnicmpASCII8280x64685a58
      __PHYSFS_utf8strcasecmp8290x64685844
      __PHYSFS_utf8strnicmp8300x64685914
      __deregister_frame8310x6468d0a8
      __deregister_frame_info8320x6468d0a0
      __deregister_frame_info_bases8330x6468cee4
      __emutls_get_address8340x6468b3e0
      __emutls_register_common8350x6468b5f4
      __frame_state_for8360x6468ada8
      __register_frame8370x6468ca90
      __register_frame_info8380x6468c910
      __register_frame_info_bases8390x6468c794
      __register_frame_info_table8400x6468cd64
      __register_frame_info_table_bases8410x6468cc18
      __register_frame_table8420x6468ceb0
      _al_aa_delete8430x64603b38
      _al_aa_free8440x64603b80
      _al_aa_insert8450x64603aac
      _al_aa_search8460x64603adc
      _al_acodec_stop_feed_thread8470x645c2130
      _al_add_exit_func8480x645ff32c
      _al_append_native_text_log8490x645d583c
      _al_balloc8500x646042b4
      _al_ballocmin8510x64604454
      _al_bassign8520x64605928
      _al_bassignblk8530x64605b74
      _al_bassigncstr8540x64605a80
      _al_bassignformat8550x64609f58
      _al_bassigngets8560x64607a54
      _al_bassignmidstr8570x646059bc
      _al_bcatblk8580x64604d54
      _al_bcatcstr8590x64604c14
      _al_bconcat8600x646056cc
      _al_bconchar8610x64604bc0
      _al_bcstrfree8620x64604b84
      _al_bdelete8630x64606824
      _al_bdestroy8640x646068c0
      _al_bfindreplace8650x64607690
      _al_bfindreplacecaseless8660x646076b4
      _al_bformat8670x6460a244
      _al_bformata8680x64609d28
      _al_bfromcstr8690x646044e4
      _al_bfromcstralloc8700x64604610
      _al_bgets8710x64607c2c
      _al_bgetsa8720x64607b40
      _al_binchr8730x64606b38
      _al_binchrr8740x64606c1c
      _al_binsert8750x64607160
      _al_binsertch8760x646076d8
      _al_binstr8770x64604060
      _al_binstrcaseless8780x646041b4
      _al_binstrr8790x64606948
      _al_binstrrcaseless8800x646069d4
      _al_biseq8810x64606414
      _al_biseqcaseless8820x64605fac
      _al_biseqcstr8830x646064ec
      _al_biseqcstrcaseless8840x64606550
      _al_bisstemeqblk8850x6460648c
      _al_bisstemeqcaselessblk8860x6460604c
      _al_bitmap_d3d_driver8870x6465bd30
      _al_bitmap_region_is_locked8880x645e0c18
      _al_bjoin8890x646088ac
      _al_blend_memory8900x645e5e14
      _al_blk2bstr8910x64604750
      _al_bltrimws8920x646060e4
      _al_bmidstr8930x646067c4
      _al_bninchr8940x64606d1c
      _al_bninchrr8950x64606e08
      _al_bpattern8960x646077fc
      _al_bread8970x64607938
      _al_breada8980x64607894
      _al_breplace8990x646073c8
      _al_brtrimws9000x646061f8
      _al_bsbufflength9010x64607df8
      _al_bsclose9020x64607e50
      _al_bseof9030x64607e20
      _al_bsetstr9040x64606f08
      _al_bsopen9050x64607d8c
      _al_bspeek9060x64608814
      _al_bsplit9070x64609710
      _al_bsplitcb9080x64609304
      _al_bsplits9090x64609bfc
      _al_bsplitscb9100x64609390
      _al_bsplitstr9110x64609808
      _al_bsplitstrcb9120x6460955c
      _al_bsread9130x6460876c
      _al_bsreada9140x64608438
      _al_bsreadln9150x64608650
      _al_bsreadlna9160x64607f20
      _al_bsreadlns9170x646086b8
      _al_bsreadlnsa9180x64608134
      _al_bssplitscb9190x64608a88
      _al_bssplitstrcb9200x64608d00
      _al_bstr2cstr9210x64604b08
      _al_bstrListAlloc9220x64609158
      _al_bstrListAllocMin9230x64609270
      _al_bstrListCreate9240x64608f88
      _al_bstrListDestroy9250x6460901c
      _al_bstrchrp9260x64606ab0
      _al_bstrcmp9270x64606600
      _al_bstrcpy9280x64604dec
      _al_bstricmp9290x64605d08
      _al_bstrncmp9300x646066e4
      _al_bstrnicmp9310x64605e40
      _al_bstrrchrp9320x64606b00
      _al_bsunread9330x646087d4
      _al_btolower9340x64605cb0
      _al_btoupper9350x64605c58
      _al_btrimws9360x646062b4
      _al_btrunc9370x64605c0c
      _al_bvcformata9380x6460a3ac
      _al_clear_bitmap_by_locking9390x646032d8
      _al_close_library9400x64623da0
      _al_close_native_text_log9410x645d57ec
      _al_cond_broadcast9420x6466c618
      _al_cond_destroy9430x6466c5a4
      _al_cond_init9440x6466c540
      _al_cond_signal9450x6466c6b0
      _al_cond_timedwait9460x6466c5ec
      _al_cond_wait9470x6466c5d8
      _al_convert_bitmap_data9480x645e2f18
      _al_convert_funcs9490x647daba0
      _al_convert_to_display_bitmap9500x645e2c18
      _al_convert_to_memory_bitmap9510x645e2d88
      _al_count_to_channel_conf9520x645c47b8
      _al_create_default_shader9530x645d6910
      _al_create_shader9540x645d686c
      _al_d3d9550x648738a4
      _al_d3d_bmp_destroy9560x6465b9b8
      _al_d3d_bmp_init9570x6465b99c
      _al_d3d_create_bitmap9580x6465d328
      _al_d3d_destroy_display_format_list9590x6466006c
      _al_d3d_format_to_allegro9600x6465edf0
      _al_d3d_generate_display_format_list9610x646600c8
      _al_d3d_get_display_mode9620x6465fe48
      _al_d3d_get_display_settings9630x64660ad8
      _al_d3d_get_nth_format9640x6465ee3c
      _al_d3d_get_num_display_modes9650x6465fcb0
      _al_d3d_init_display9660x6465ee80
      _al_d3d_lost_device_mutex9670x648738a0
      _al_d3d_num_display_formats9680x6465ee34
      _al_d3d_prepare_bitmaps_for_reset9690x6465bac0
      _al_d3d_recreate_bitmap_textures9700x6465bb80
      _al_d3d_refresh_texture_memory9710x6465bc64
      _al_d3d_release_default_pool_textures9720x6465ba34
      _al_d3d_render_to_texture_supported9730x6465ee78
      _al_d3d_resort_display_settings9740x64660aa8
      _al_d3d_score_display_settings9750x64660a30
      _al_d3d_set_bitmap_clip9760x6465f464
      _al_d3d_set_blender9770x6465f040
      _al_d3d_supports_separate_alpha_blend9780x6465ec18
      _al_deduce_color_format9790x645fc288
      _al_destroy_display_bitmaps9800x645fb5ac
      _al_display_d3d_driver9810x6465fb84
      _al_display_settings_sorter9820x645fc248
      _al_display_wgl_driver9830x64662ce8
      _al_draw_bitmap_region_memory9840x6460286c
      _al_draw_pixel_memory9850x64603230
      _al_draw_prim_directx9860x645de4d0
      _al_draw_prim_indexed_directx9870x645de534
      _al_draw_prim_indexed_opengl9880x645ded20
      _al_draw_prim_indexed_soft9890x645dfce4
      _al_draw_prim_opengl9900x645dea9c
      _al_draw_prim_soft9910x645df194
      _al_draw_soft_triangle9920x646571a8
      _al_dtor_list9930x64873660
      _al_event_queue_push_event9940x645fee1c
      _al_event_source_emit_event9950x645ff128
      _al_event_source_free9960x645ff01c
      _al_event_source_init9970x645fefe0
      _al_event_source_lock9980x645ff064
      _al_event_source_needs_to_generate_event9990x645ff118
      _al_event_source_on_registration_to_queue10000x645ff09c
      _al_event_source_on_unregistration_from_queue10010x645ff0d8
      _al_event_source_unlock10020x645ff080
      _al_file_interface_stdio10030x647e8160
      _al_fill_display_settings10040x645fb8e0
      _al_fix_acos_tbl10050x647dbb60
      _al_fix_cos_tbl10060x647dc780
      _al_fix_tan_tbl10070x647dc380
      _al_font_vtable_color10080x647daa00
      _al_foreach_destructor10090x645fe464
      _al_fs_interface_stdio10100x647db760
      _al_generate_joystick_event10110x64601ee8
      _al_get_new_display_settings10120x64624a18
      _al_get_phys_vtable10130x645d5c64
      _al_get_real_pixel_format10140x646234b0
      _al_get_thread_should_stop10150x64601d78
      _al_glAccumxOES10160x64871ff4
      _al_glActiveProgramEXT10170x648719f8
      _al_glActiveStencilFaceEXT10180x64872300
      _al_glActiveTexture10190x6487359c
      _al_glActiveTextureARB10200x6487314c
      _al_glActiveVaryingNV10210x64871de4
      _al_glAlphaFragmentOp1ATI10220x648724d8
      _al_glAlphaFragmentOp2ATI10230x648724d4
      _al_glAlphaFragmentOp3ATI10240x648724d0
      _al_glAlphaFuncxOES10250x64872008
      _al_glApplyTextureEXT10260x64872908
      _al_glAreProgramsResidentNV10270x64872610
      _al_glAreTexturesResidentEXT10280x64872a6c
      _al_glArrayElementEXT10290x64872a3c
      _al_glArrayObjectATI10300x648724a8
      _al_glAsyncMarkerSGIX10310x648728fc
      _al_glAttachObjectARB10320x64872eb0
      _al_glAttachShader10330x648733d0
      _al_glBeginConditionalRender10340x64873220
      _al_glBeginConditionalRenderNV10350x64871dd8
      _al_glBeginFragmentShaderATI10360x648724f4
      _al_glBeginOcclusionQueryNV10370x64872318
      _al_glBeginPerfMonitorAMD10380x64871a84
      _al_glBeginQuery10390x648733f8
      _al_glBeginQueryARB10400x64872ee0
      _al_glBeginQueryIndexed10410x64872b48
      _al_glBeginTransformFeedback10420x6487323c
      _al_glBeginTransformFeedbackEXT10430x64871dd0
      _al_glBeginTransformFeedbackNV10440x64871df4
      _al_glBeginVertexShaderEXT10450x64872490
      _al_glBeginVideoCaptureNV10460x64871a2c
      _al_glBindAttribLocation10470x64873294
      _al_glBindAttribLocationARB10480x64872e30
      _al_glBindBuffer10490x64873430
      _al_glBindBufferARB10500x64872f18
      _al_glBindBufferBase10510x64873230
      _al_glBindBufferBaseEXT10520x64871dc0
      _al_glBindBufferBaseNV10530x64871e00
      _al_glBindBufferOffsetEXT10540x64871dc4
      _al_glBindBufferOffsetNV10550x64871e04
      _al_glBindBufferRange10560x64873234
      _al_glBindBufferRangeEXT10570x64871dc8
      _al_glBindBufferRangeNV10580x64871e08
      _al_glBindFragDataLocation10590x648731b8
      _al_glBindFragDataLocationEXT10600x64871e78
      _al_glBindFragDataLocationIndexed10610x64872d08
      _al_glBindFragmentShaderATI10620x648724fc
      _al_glBindFramebuffer10630x64872df8
      _al_glBindFramebufferEXT10640x64871f80
      _al_glBindLightParameterEXT10650x64872428
      _al_glBindMaterialParameterEXT10660x64872424
      _al_glBindMultiTextureEXT10670x64871cc0
      _al_glBindParameterEXT10680x64872418
      _al_glBindProgramARB10690x64872f70
      _al_glBindProgramNV10700x6487260c
      _al_glBindRenderbuffer10710x64872e10
      _al_glBindRenderbufferEXT10720x64871f98
      _al_glBindSampler10730x64872cf4
      _al_glBindTexGenParameterEXT10740x64872420
      _al_glBindTextureEXT10750x64872a68
      _al_glBindTextureUnitParameterEXT10760x6487241c
      _al_glBindTransformFeedback10770x64872b68
      _al_glBindTransformFeedbackNV10780x64871ac0
      _al_glBindVertexArray10790x64872da4
      _al_glBindVertexArrayAPPLE10800x648722c8
      _al_glBindVertexShaderEXT10810x64872488
      _al_glBindVideoCaptureStreamBufferNV10820x64871a28
      _al_glBindVideoCaptureStreamTextureNV10830x64871a24
      _al_glBinormal3bEXT10840x64872838
      _al_glBinormal3bvEXT10850x64872834
      _al_glBinormal3dEXT10860x64872830
      _al_glBinormal3dvEXT10870x6487282c
      _al_glBinormal3fEXT10880x64872828
      _al_glBinormal3fvEXT10890x64872824
      _al_glBinormal3iEXT10900x64872820
      _al_glBinormal3ivEXT10910x6487281c
      _al_glBinormal3sEXT10920x64872818
      _al_glBinormal3svEXT10930x64872814
      _al_glBinormalPointerEXT10940x6487280c
      _al_glBitmapxOES10950x64872038
      _al_glBlendColor10960x64873634
      _al_glBlendColorEXT10970x64872b3c
      _al_glBlendColorxOES10980x64872004
      _al_glBlendEquation10990x64873630
      _al_glBlendEquationEXT11000x64872a18
      _al_glBlendEquationIndexedAMD11010x64871a64
      _al_glBlendEquationSeparate11020x648733e4
      _al_glBlendEquationSeparateEXT11030x64871fa0
      _al_glBlendEquationSeparateIndexedAMD11040x64871a60
      _al_glBlendEquationSeparatei11050x64872d30
      _al_glBlendEquationi11060x64872d34
      _al_glBlendFuncIndexedAMD11070x64871a6c
      _al_glBlendFuncSeparate11080x648734e4
      _al_glBlendFuncSeparateEXT11090x64872728
      _al_glBlendFuncSeparateINGR11100x64872724
      _al_glBlendFuncSeparateIndexedAMD11110x64871a68
      _al_glBlendFuncSeparatei11120x64872d28
      _al_glBlendFunci11130x64872d2c
      _al_glBlitFramebuffer11140x64872dd0
      _al_glBlitFramebufferEXT11150x64871f50
      _al_glBufferAddressRangeNV11160x648719b8
      _al_glBufferData11170x64873420
      _al_glBufferDataARB11180x64872f08
      _al_glBufferParameteriAPPLE11190x64871f38
      _al_glBufferSubData11200x6487341c
      _al_glBufferSubDataARB11210x64872f04
      _al_glCheckFramebufferStatus11220x64872dec
      _al_glCheckFramebufferStatusEXT11230x64871f74
      _al_glCheckNamedFramebufferStatusEXT11240x64871b18
      _al_glClampColor11250x64873224
      _al_glClampColorARB11260x64872e20
      _al_glClearAccumxOES11270x64871ff8
      _al_glClearBufferfi11280x64873174
      _al_glClearBufferfv11290x64873178
      _al_glClearBufferiv11300x64873180
      _al_glClearBufferuiv11310x6487317c
      _al_glClearColorxOES11320x64872000
      _al_glClearDepthdNV11330x64871e64
      _al_glClearDepthfOES11340x64871fac
      _al_glClearDepthxOES11350x64871ffc
      _al_glClientActiveTexture11360x64873598
      _al_glClientActiveTextureARB11370x64873148
      _al_glClientActiveVertexStreamATI11380x64872340
      _al_glClientAttribDefaultEXT11390x64871db4
      _al_glClientWaitSync11400x64872d54
      _al_glClipPlanefOES11410x64871fb4
      _al_glClipPlanexOES11420x648720a8
      _al_glColor3fVertex3fSUN11430x648727b8
      _al_glColor3fVertex3fvSUN11440x648727b4
      _al_glColor3hNV11450x64872270
      _al_glColor3hvNV11460x6487226c
      _al_glColor3xOES11470x648720fc
      _al_glColor3xvOES11480x648720f4
      _al_glColor4fNormal3fVertex3fSUN11490x648727a8
      _al_glColor4fNormal3fVertex3fvSUN11500x648727a4
      _al_glColor4hNV11510x64872268
      _al_glColor4hvNV11520x64872264
      _al_glColor4ubVertex2fSUN11530x648727c8
      _al_glColor4ubVertex2fvSUN11540x648727c4
      _al_glColor4ubVertex3fSUN11550x648727c0
      _al_glColor4ubVertex3fvSUN11560x648727bc
      _al_glColor4xOES11570x648720f8
      _al_glColor4xvOES11580x648720f0
      _al_glColorFormatNV11590x648719ac
      _al_glColorFragmentOp1ATI11600x648724e4
      _al_glColorFragmentOp2ATI11610x648724e0
      _al_glColorFragmentOp3ATI11620x648724dc
      _al_glColorMaskIndexedEXT11630x64871f24
      _al_glColorMaski11640x64873254
      _al_glColorP3ui11650x64872c5c
      _al_glColorP3uiv11660x64872c58
      _al_glColorP4ui11670x64872c54
      _al_glColorP4uiv11680x64872c50
      _al_glColorPointerEXT11690x64872a38
      _al_glColorPointervINTEL11700x648728dc
      _al_glColorSubTable11710x6487360c
      _al_glColorTable11720x64873628
      _al_glColorTableEXT11730x64872994
      _al_glColorTableParameterfv11740x64873624
      _al_glColorTableParameterfvSGI11750x64872aa8
      _al_glColorTableParameteriv11760x64873620
      _al_glColorTableParameterivSGI11770x64872aa4
      _al_glColorTableSGI11780x64872aac
      _al_glCombinerInputNV11790x648726fc
      _al_glCombinerOutputNV11800x648726f8
      _al_glCombinerParameterfNV11810x64872708
      _al_glCombinerParameterfvNV11820x6487270c
      _al_glCombinerParameteriNV11830x64872700
      _al_glCombinerParameterivNV11840x64872704
      _al_glCombinerStageParameterfvNV11850x64872618
      _al_glCompileShader11860x648733c4
      _al_glCompileShaderARB11870x64872eb8
      _al_glCompileShaderIncludeARB11880x64872d18
      _al_glCompressedMultiTexImage1DEXT11890x64871c44
      _al_glCompressedMultiTexImage2DEXT11900x64871c48
      _al_glCompressedMultiTexImage3DEXT11910x64871c4c
      _al_glCompressedMultiTexSubImage1DEXT11920x64871c38
      _al_glCompressedMultiTexSubImage2DEXT11930x64871c3c
      _al_glCompressedMultiTexSubImage3DEXT11940x64871c40
      _al_glCompressedTexImage1D11950x648734f8
      _al_glCompressedTexImage1DARB11960x648730a8
      _al_glCompressedTexImage2D11970x648734fc
      _al_glCompressedTexImage2DARB11980x648730ac
      _al_glCompressedTexImage3D11990x64873500
      _al_glCompressedTexImage3DARB12000x648730b0
      _al_glCompressedTexSubImage1D12010x648734ec
      _al_glCompressedTexSubImage1DARB12020x6487309c
      _al_glCompressedTexSubImage2D12030x648734f0
      _al_glCompressedTexSubImage2DARB12040x648730a0
      _al_glCompressedTexSubImage3D12050x648734f4
      _al_glCompressedTexSubImage3DARB12060x648730a4
      _al_glCompressedTextureImage1DEXT12070x64871c60
      _al_glCompressedTextureImage2DEXT12080x64871c64
      _al_glCompressedTextureImage3DEXT12090x64871c68
      _al_glCompressedTextureSubImage1DEXT12100x64871c54
      _al_glCompressedTextureSubImage2DEXT12110x64871c58
      _al_glCompressedTextureSubImage3DEXT12120x64871c5c
      _al_glConvolutionFilter1D12130x648735f8
      _al_glConvolutionFilter1DEXT12140x64872ae0
      _al_glConvolutionFilter2D12150x648735f4
      _al_glConvolutionFilter2DEXT12160x64872adc
      _al_glConvolutionParameterf12170x648735f0
      _al_glConvolutionParameterfEXT12180x64872ad8
      _al_glConvolutionParameterfv12190x648735ec
      _al_glConvolutionParameterfvEXT12200x64872ad4
      _al_glConvolutionParameteri12210x648735e8
      _al_glConvolutionParameteriEXT12220x64872ad0
      _al_glConvolutionParameteriv12230x648735e4
      _al_glConvolutionParameterivEXT12240x64872acc
      _al_glConvolutionParameterxOES12250x6487204c
      _al_glConvolutionParameterxvOES12260x64872048
      _al_glCopyBufferSubData12270x64872d78
      _al_glCopyColorSubTable12280x64873608
      _al_glCopyColorSubTableEXT12290x6487299c
      _al_glCopyColorTable12300x6487361c
      _al_glCopyColorTableSGI12310x64872aa0
      _al_glCopyConvolutionFilter1D12320x648735e0
      _al_glCopyConvolutionFilter1DEXT12330x64872ac8
      _al_glCopyConvolutionFilter2D12340x648735dc
      _al_glCopyConvolutionFilter2DEXT12350x64872ac4
      _al_glCopyMultiTexImage1DEXT12360x64871cf0
      _al_glCopyMultiTexImage2DEXT12370x64871cec
      _al_glCopyMultiTexSubImage1DEXT12380x64871ce8
      _al_glCopyMultiTexSubImage2DEXT12390x64871ce4
      _al_glCopyMultiTexSubImage3DEXT12400x64871cc4
      _al_glCopyTexImage1DEXT12410x64872b1c
      _al_glCopyTexImage2DEXT12420x64872b18
      _al_glCopyTexSubImage1DEXT12430x64872b14
      _al_glCopyTexSubImage2DEXT12440x64872b10
      _al_glCopyTexSubImage3D12450x648735fc
      _al_glCopyTexSubImage3DEXT12460x64872b0c
      _al_glCopyTextureImage1DEXT12470x64871d40
      _al_glCopyTextureImage2DEXT12480x64871d3c
      _al_glCopyTextureSubImage1DEXT12490x64871d38
      _al_glCopyTextureSubImage2DEXT12500x64871d34
      _al_glCopyTextureSubImage3DEXT12510x64871d14
      _al_glCreateProgram12520x648733e0
      _al_glCreateProgramObjectARB12530x64872eb4
      _al_glCreateShader12540x648733dc
      _al_glCreateShaderObjectARB12550x64872ec0
      _al_glCreateShaderProgramEXT12560x648719f4
      _al_glCullParameterdvEXT12570x6487295c
      _al_glCullParameterfvEXT12580x64872958
      _al_glCurrentPaletteMatrixARB12590x64873064
      _al_glDeformSGIX12600x648729cc
      _al_glDeformationMap3dSGIX12610x648729d4
      _al_glDeformationMap3fSGIX12620x648729d0
      _al_glDeleteAsyncMarkersSGIX12630x648728ec
      _al_glDeleteBuffers12640x6487342c
      _al_glDeleteBuffersARB12650x64872f14
      _al_glDeleteFencesAPPLE12660x648722e4
      _al_glDeleteFencesNV12670x64872658
      _al_glDeleteFragmentShaderATI12680x648724f8
      _al_glDeleteFramebuffers12690x64872df4
      _al_glDeleteFramebuffersEXT12700x64871f7c
      _al_glDeleteNamedStringARB12710x64872d1c
      _al_glDeleteObjectARB12720x64872ecc
      _al_glDeleteOcclusionQueriesNV12730x64872320
      _al_glDeletePerfMonitorsAMD12740x64871a8c
      _al_glDeleteProgram12750x648733d8
      _al_glDeleteProgramsARB12760x64872f6c
      _al_glDeleteProgramsNV12770x64872608
      _al_glDeleteQueries12780x64873400
      _al_glDeleteQueriesARB12790x64872ee8
      _al_glDeleteRenderbuffers12800x64872e0c
      _al_glDeleteRenderbuffersEXT12810x64871f94
      _al_glDeleteSamplers12820x64872cfc
      _al_glDeleteShader12830x648733d4
      _al_glDeleteSync12840x64872d58
      _al_glDeleteTexturesEXT12850x64872a64
      _al_glDeleteTransformFeedbacks12860x64872b64
      _al_glDeleteTransformFeedbacksNV12870x64871abc
      _al_glDeleteVertexArrays12880x64872da0
      _al_glDeleteVertexArraysAPPLE12890x648722c4
      _al_glDeleteVertexShaderEXT12900x64872480
      _al_glDepthBoundsEXT12910x64871fa4
      _al_glDepthBoundsdNV12920x64871e60
      _al_glDepthRangedNV12930x64871e68
      _al_glDepthRangefOES12940x64871fc0
      _al_glDepthRangexOES12950x648720dc
      _al_glDetachObjectARB12960x64872ec4
      _al_glDetachShader12970x648733cc
      _al_glDetailTexFuncSGIS12980x64872a54
      _al_glDisableClientStateIndexedEXT12990x64871cb8
      _al_glDisableIndexedEXT13000x64871f14
      _al_glDisableVariantClientStateEXT13010x6487242c
      _al_glDisableVertexAttribAPPLE13020x64871a50
      _al_glDisableVertexAttribArray13030x64873298
      _al_glDisableVertexAttribArrayARB13040x64872f78
      _al_glDisablei13050x64873244
      _al_glDrawArraysEXT13060x64872a34
      _al_glDrawArraysIndirect13070x64872c24
      _al_glDrawArraysInstanced13080x6487316c
      _al_glDrawArraysInstancedARB13090x64872e1c
      _al_glDrawArraysInstancedEXT13100x64871f0c
      _al_glDrawBuffers13110x64873278
      _al_glDrawBuffersARB13120x64872e24
      _al_glDrawBuffersATI13130x648722ac
      _al_glDrawElementArrayAPPLE13140x648722f8
      _al_glDrawElementArrayATI13150x64872330
      _al_glDrawElementsBaseVertex13160x64872d74
      _al_glDrawElementsIndirect13170x64872c20
      _al_glDrawElementsInstanced13180x64873168
      _al_glDrawElementsInstancedARB13190x64872e18
      _al_glDrawElementsInstancedBaseVertex13200x64872d6c
      _al_glDrawElementsInstancedEXT13210x64871f08
      _al_glDrawMeshArraysSUN13220x64872328
      _al_glDrawRangeElementArrayAPPLE13230x648722f4
      _al_glDrawRangeElementArrayATI13240x6487232c
      _al_glDrawRangeElements13250x6487362c
      _al_glDrawRangeElementsBaseVertex13260x64872d70
      _al_glDrawRangeElementsEXT13270x6487290c
      _al_glDrawTransformFeedback13280x64872b50
      _al_glDrawTransformFeedbackNV13290x64871aa8
      _al_glDrawTransformFeedbackStream13300x64872b4c
      _al_glEdgeFlagFormatNV13310x648719a0
      _al_glEdgeFlagPointerEXT13320x64872a30
      _al_glElementPointerAPPLE13330x648722fc
      _al_glElementPointerATI13340x64872334
      _al_glEnableClientStateIndexedEXT13350x64871cbc
      _al_glEnableIndexedEXT13360x64871f18
      _al_glEnableVariantClientStateEXT13370x64872430
      _al_glEnableVertexAttribAPPLE13380x64871a54
      _al_glEnableVertexAttribArray13390x6487329c
      _al_glEnableVertexAttribArrayARB13400x64872f7c
      _al_glEnablei13410x64873248
      _al_glEndConditionalRender13420x6487321c
      _al_glEndConditionalRenderNV13430x64871dd4
      _al_glEndFragmentShaderATI13440x648724f0
      _al_glEndOcclusionQueryNV13450x64872314
      _al_glEndPerfMonitorAMD13460x64871a80
      _al_glEndQuery13470x648733f4
      _al_glEndQueryARB13480x64872edc
      _al_glEndQueryIndexed13490x64872b44
      _al_glEndTransformFeedback13500x64873238
      _al_glEndTransformFeedbackEXT13510x64871dcc
      _al_glEndTransformFeedbackNV13520x64871df0
      _al_glEndVertexShaderEXT13530x6487248c
      _al_glEndVideoCaptureNV13540x64871a20
      _al_glEvalCoord1xOES13550x64871fdc
      _al_glEvalCoord1xvOES13560x64871fd4
      _al_glEvalCoord2xOES13570x64871fd8
      _al_glEvalCoord2xvOES13580x64871fd0
      _al_glEvalMapsNV13590x6487261c
      _al_glExecuteProgramNV13600x64872604
      _al_glExtractComponentEXT13610x64872464
      _al_glFeedbackBufferxOES13620x64871fcc
      _al_glFenceSync13630x64872d60
      _al_glFinalCombinerInputNV13640x648726f4
      _al_glFinishAsyncSGIX13650x648728f8
      _al_glFinishFenceAPPLE13660x648722d4
      _al_glFinishFenceNV13670x64872644
      _al_glFinishObjectAPPLE13680x648722cc
      _al_glFinishTextureSUNX13690x64872808
      _al_glFlushMappedBufferRange13700x64872dac
      _al_glFlushMappedBufferRangeAPPLE13710x64871f34
      _al_glFlushPixelDataRangeNV13720x648721d4
      _al_glFlushRasterSGIX13730x648729c0
      _al_glFlushVertexArrayRangeAPPLE13740x648722b4
      _al_glFlushVertexArrayRangeNV13750x64872714
      _al_glFogCoordFormatNV13760x64871998
      _al_glFogCoordPointer13770x648734d0
      _al_glFogCoordPointerEXT13780x64872864
      _al_glFogCoordd13790x648734d8
      _al_glFogCoorddEXT13800x6487286c
      _al_glFogCoorddv13810x648734d4
      _al_glFogCoorddvEXT13820x64872868
      _al_glFogCoordf13830x648734e0
      _al_glFogCoordfEXT13840x64872874
      _al_glFogCoordfv13850x648734dc
      _al_glFogCoordfvEXT13860x64872870
      _al_glFogCoordhNV13870x64872220
      _al_glFogCoordhvNV13880x6487221c
      _al_glFogFuncSGIS13890x648729bc
      _al_glFogxOES13900x64872014
      _al_glFogxvOES13910x64872010
      _al_glFragmentColorMaterialSGIX13920x64872954
      _al_glFragmentLightModelfSGIX13930x64872940
      _al_glFragmentLightModelfvSGIX13940x6487293c
      _al_glFragmentLightModeliSGIX13950x64872938
      _al_glFragmentLightModelivSGIX13960x64872934
      _al_glFragmentLightfSGIX13970x64872950
      _al_glFragmentLightfvSGIX13980x6487294c
      _al_glFragmentLightiSGIX13990x64872948
      _al_glFragmentLightivSGIX14000x64872944
      _al_glFragmentMaterialfSGIX14010x64872930
      _al_glFragmentMaterialfvSGIX14020x6487292c
      _al_glFragmentMaterialiSGIX14030x64872928
      _al_glFragmentMaterialivSGIX14040x64872924
      _al_glFrameTerminatorGREMEDY14050x64871ddc
      _al_glFrameZoomSGIX14060x648729dc
      _al_glFramebufferDrawBufferEXT14070x64871af8
      _al_glFramebufferDrawBuffersEXT14080x64871af4
      _al_glFramebufferReadBufferEXT14090x64871af0
      _al_glFramebufferRenderbuffer14100x64872ddc
      _al_glFramebufferRenderbufferEXT14110x64871f64
      _al_glFramebufferTexture14120x64873150
      _al_glFramebufferTexture1D14130x64872de8
      _al_glFramebufferTexture1DEXT14140x64871f70
      _al_glFramebufferTexture2D14150x64872de4
      _al_glFramebufferTexture2DEXT14160x64871f6c
      _al_glFramebufferTexture3D14170x64872de0
      _al_glFramebufferTexture3DEXT14180x64871f68
      _al_glFramebufferTextureARB14190x64872dc0
      _al_glFramebufferTextureEXT14200x64871f00
      _al_glFramebufferTextureFaceARB14210x64872db8
      _al_glFramebufferTextureFaceEXT14220x64871efc
      _al_glFramebufferTextureLayer14230x64872dc8
      _al_glFramebufferTextureLayerARB14240x64872dbc
      _al_glFramebufferTextureLayerEXT14250x64871e70
      _al_glFreeObjectBufferATI14260x648724ac
      _al_glFrustumfOES14270x64871fbc
      _al_glFrustumxOES14280x648720bc
      _al_glGenAsyncMarkersSGIX14290x648728f0
      _al_glGenBuffers14300x64873428
      _al_glGenBuffersARB14310x64872f10
      _al_glGenFencesAPPLE14320x648722e8
      _al_glGenFencesNV14330x64872654
      _al_glGenFragmentShadersATI14340x64872500
      _al_glGenFramebuffers14350x64872df0
      _al_glGenFramebuffersEXT14360x64871f78
      _al_glGenOcclusionQueriesNV14370x64872324
      _al_glGenPerfMonitorsAMD14380x64871a90
      _al_glGenProgramsARB14390x64872f68
      _al_glGenProgramsNV14400x64872600
      _al_glGenQueries14410x64873404
      _al_glGenQueriesARB14420x64872eec
      _al_glGenRenderbuffers14430x64872e08
      _al_glGenRenderbuffersEXT14440x64871f90
      _al_glGenSamplers14450x64872d00
      _al_glGenSymbolsEXT14460x64872460
      _al_glGenTexturesEXT14470x64872a60
      _al_glGenTransformFeedbacks14480x64872b60
      _al_glGenTransformFeedbacksNV14490x64871ab8
      _al_glGenVertexArrays14500x64872d9c
      _al_glGenVertexArraysAPPLE14510x648722c0
      _al_glGenVertexShadersEXT14520x64872484
      _al_glGenerateMipmap14530x64872dd4
      _al_glGenerateMipmapEXT14540x64871f5c
      _al_glGenerateMultiTexMipmapEXT14550x64871afc
      _al_glGenerateTextureMipmapEXT14560x64871b00
      _al_glGetActiveAttrib14570x64873290
      _al_glGetActiveAttribARB14580x64872e2c
      _al_glGetActiveSubroutineName14590x64872b80
      _al_glGetActiveSubroutineUniformName14600x64872b84
      _al_glGetActiveSubroutineUniformiv14610x64872b88
      _al_glGetActiveUniform14620x64873340
      _al_glGetActiveUniformARB14630x64872e40
      _al_glGetActiveUniformBlockName14640x64872d80
      _al_glGetActiveUniformBlockiv14650x64872d84
      _al_glGetActiveUniformName14660x64872d8c
      _al_glGetActiveUniformsiv14670x64872d90
      _al_glGetActiveVaryingNV14680x64871de8
      _al_glGetArrayObjectfvATI14690x648724a4
      _al_glGetArrayObjectivATI14700x648724a0
      _al_glGetAttachedObjectsARB14710x64872e48
      _al_glGetAttachedShaders14720x64873348
      _al_glGetAttribLocation14730x6487328c
      _al_glGetAttribLocationARB14740x64872e28
      _al_glGetBooleanIndexedvEXT14750x64871f20
      _al_glGetBooleani_v14760x64873250
      _al_glGetBufferParameteri64v14770x64873158
      _al_glGetBufferParameteriv14780x6487340c
      _al_glGetBufferParameterivARB14790x64872ef4
      _al_glGetBufferParameterui64vNV14800x648719d8
      _al_glGetBufferPointerv14810x64873408
      _al_glGetBufferPointervARB14820x64872ef0
      _al_glGetBufferSubData14830x64873418
      _al_glGetBufferSubDataARB14840x64872f00
      _al_glGetClipPlanefOES14850x64871fb0
      _al_glGetClipPlanexOES14860x648720a4
      _al_glGetColorTable14870x64873618
      _al_glGetColorTableEXT14880x64872990
      _al_glGetColorTableParameterfv14890x64873614
      _al_glGetColorTableParameterfvEXT14900x64872988
      _al_glGetColorTableParameterfvSGI14910x64872a98
      _al_glGetColorTableParameteriv14920x64873610
      _al_glGetColorTableParameterivEXT14930x6487298c
      _al_glGetColorTableParameterivSGI14940x64872a94
      _al_glGetColorTableSGI14950x64872a9c
      _al_glGetCombinerInputParameterfvNV14960x648726f0
      _al_glGetCombinerInputParameterivNV14970x648726ec
      _al_glGetCombinerOutputParameterfvNV14980x648726e8
      _al_glGetCombinerOutputParameterivNV14990x648726e4
      _al_glGetCombinerStageParameterfvNV15000x64872614
      _al_glGetCompressedMultiTexImageEXT15010x64871c34
      _al_glGetCompressedTexImage15020x648734e8
      _al_glGetCompressedTexImageARB15030x64873098
      _al_glGetCompressedTextureImageEXT15040x64871c50
      _al_glGetConvolutionFilter15050x648735d8
      _al_glGetConvolutionFilterEXT15060x64872ac0
      _al_glGetConvolutionParameterfv15070x648735d4
      _al_glGetConvolutionParameterfvEXT15080x64872abc
      _al_glGetConvolutionParameteriv15090x648735d0
      _al_glGetConvolutionParameterivEXT15100x64872ab8
      _al_glGetConvolutionParameterxvOES15110x64872044
      _al_glGetDetailTexFuncSGIS15120x64872a50
      _al_glGetDoubleIndexedvEXT15130x64871c70
      _al_glGetFenceivNV15140x64872648
      _al_glGetFinalCombinerInputParameterfvNV15150x648726e0
      _al_glGetFinalCombinerInputParameterivNV15160x648726dc
      _al_glGetFixedvOES15170x64871fc4
      _al_glGetFloatIndexedvEXT15180x64871c74
      _al_glGetFogFuncSGIS15190x648729b8
      _al_glGetFragDataIndex15200x64872d04
      _al_glGetFragDataLocation15210x648731b4
      _al_glGetFragDataLocationEXT15220x64871e74
      _al_glGetFragmentLightfvSGIX15230x64872920
      _al_glGetFragmentLightivSGIX15240x6487291c
      _al_glGetFragmentMaterialfvSGIX15250x64872918
      _al_glGetFragmentMaterialivSGIX15260x64872914
      _al_glGetFramebufferAttachmentParameteriv15270x64872dd8
      _al_glGetFramebufferAttachmentParameterivEXT15280x64871f60
      _al_glGetFramebufferParameterivEXT15290x64871aec
      _al_glGetHandleARB15300x64872ec8
      _al_glGetHistogram15310x648735c4
      _al_glGetHistogramEXT15320x64872b08
      _al_glGetHistogramParameterfv15330x648735c0
      _al_glGetHistogramParameterfvEXT15340x64872b04
      _al_glGetHistogramParameteriv15350x648735bc
      _al_glGetHistogramParameterivEXT15360x64872b00
      _al_glGetHistogramParameterxvOES15370x64872040
      _al_glGetImageTransformParameterfvHP15380x648729a0
      _al_glGetImageTransformParameterivHP15390x648729a4
      _al_glGetInfoLogARB15400x64872e4c
      _al_glGetInstrumentsSGIX15410x648729f4
      _al_glGetInteger64i_v15420x6487315c
      _al_glGetInteger64v15430x64872d4c
      _al_glGetIntegerIndexedvEXT15440x64871f1c
      _al_glGetIntegeri_v15450x6487324c
      _al_glGetIntegerui64i_vNV15460x6487198c
      _al_glGetIntegerui64vNV15470x648719d0
      _al_glGetInvariantBooleanvEXT15480x64872400
      _al_glGetInvariantFloatvEXT15490x648723f8
      _al_glGetInvariantIntegervEXT15500x648723fc
      _al_glGetLightxOES15510x64872074
      _al_glGetListParameterfvSGIX15520x64872984
      _al_glGetListParameterivSGIX15530x64872980
      _al_glGetLocalConstantBooleanvEXT15540x648723f4
      _al_glGetLocalConstantFloatvEXT15550x648723ec
      _al_glGetLocalConstantIntegervEXT15560x648723f0
      _al_glGetMapAttribParameterfvNV15570x64872620
      _al_glGetMapAttribParameterivNV15580x64872624
      _al_glGetMapControlPointsNV15590x64872630
      _al_glGetMapParameterfvNV15600x64872628
      _al_glGetMapParameterivNV15610x6487262c
      _al_glGetMapxvOES15620x64871fe0
      _al_glGetMaterialxOES15630x64872080
      _al_glGetMinmax15640x648735b8
      _al_glGetMinmaxEXT15650x64872afc
      _al_glGetMinmaxParameterfv15660x648735b4
      _al_glGetMinmaxParameterfvEXT15670x64872af8
      _al_glGetMinmaxParameteriv15680x648735b0
      _al_glGetMinmaxParameterivEXT15690x64872af4
      _al_glGetMultiTexEnvfvEXT15700x64871c88
      _al_glGetMultiTexEnvivEXT15710x64871c84
      _al_glGetMultiTexGendvEXT15720x64871c80
      _al_glGetMultiTexGenfvEXT15730x64871c7c
      _al_glGetMultiTexGenivEXT15740x64871c78
      _al_glGetMultiTexImageEXT15750x64871ce0
      _al_glGetMultiTexLevelParameterfvEXT15760x64871cd4
      _al_glGetMultiTexLevelParameterivEXT15770x64871cd0
      _al_glGetMultiTexParameterIivEXT15780x64871bd0
      _al_glGetMultiTexParameterIuivEXT15790x64871bcc
      _al_glGetMultiTexParameterfvEXT15800x64871cdc
      _al_glGetMultiTexParameterivEXT15810x64871cd8
      _al_glGetMultisamplefv15820x64872d3c
      _al_glGetMultisamplefvNV15830x64871acc
      _al_glGetNamedBufferParameterivEXT15840x64871b34
      _al_glGetNamedBufferParameterui64vNV15850x648719d4
      _al_glGetNamedBufferPointervEXT15860x64871b30
      _al_glGetNamedBufferSubDataEXT15870x64871b2c
      _al_glGetNamedFramebufferAttachmentParameterivEXT15880x64871b04
      _al_glGetNamedProgramLocalParameterIivEXT15890x64871bf0
      _al_glGetNamedProgramLocalParameterIuivEXT15900x64871bec
      _al_glGetNamedProgramLocalParameterdvEXT15910x64871c1c
      _al_glGetNamedProgramLocalParameterfvEXT15920x64871c18
      _al_glGetNamedProgramStringEXT15930x64871c10
      _al_glGetNamedProgramivEXT15940x64871c14
      _al_glGetNamedRenderbufferParameterivEXT15950x64871b1c
      _al_glGetNamedStringARB15960x64872d10
      _al_glGetNamedStringivARB15970x64872d0c
      _al_glGetObjectBufferfvATI15980x648724b4
      _al_glGetObjectBufferivATI15990x648724b0
      _al_glGetObjectParameterfvARB16000x64872e54
      _al_glGetObjectParameterivAPPLE16010x64871a30
      _al_glGetObjectParameterivARB16020x64872e50
      _al_glGetOcclusionQueryivNV16030x64872310
      _al_glGetOcclusionQueryuivNV16040x6487230c
      _al_glGetPerfMonitorCounterDataAMD16050x64871a7c
      _al_glGetPerfMonitorCounterInfoAMD16060x64871a94
      _al_glGetPerfMonitorCounterStringAMD16070x64871a98
      _al_glGetPerfMonitorCountersAMD16080x64871aa0
      _al_glGetPerfMonitorGroupStringAMD16090x64871a9c
      _al_glGetPerfMonitorGroupsAMD16100x64871aa4
      _al_glGetPixelMapxv16110x64872050
      _al_glGetPixelTexGenParameterfvSGIS16120x64872a78
      _al_glGetPixelTexGenParameterivSGIS16130x64872a7c
      _al_glGetPointerIndexedvEXT16140x64871c6c
      _al_glGetPointervEXT16150x64872a2c
      _al_glGetProgramEnvParameterIivNV16160x64871e1c
      _al_glGetProgramEnvParameterIuivNV16170x64871e18
      _al_glGetProgramEnvParameterdvARB16180x64872f44
      _al_glGetProgramEnvParameterfvARB16190x64872f40
      _al_glGetProgramInfoLog16200x6487334c
      _al_glGetProgramLocalParameterIivNV16210x64871e24
      _al_glGetProgramLocalParameterIuivNV16220x64871e20
      _al_glGetProgramLocalParameterdvARB16230x64872f3c
      _al_glGetProgramLocalParameterfvARB16240x64872f38
      _al_glGetProgramNamedParameterdvNV16250x64872294
      _al_glGetProgramNamedParameterfvNV16260x64872298
      _al_glGetProgramParameterdvNV16270x648725fc
      _al_glGetProgramParameterfvNV16280x648725f8
      _al_glGetProgramStageiv16290x64872b74
      _al_glGetProgramStringARB16300x64872f30
      _al_glGetProgramStringNV16310x648725f0
      _al_glGetProgramfv16320x64873358
      _al_glGetProgramiv16330x64873354
      _al_glGetProgramivARB16340x64872f34
      _al_glGetProgramivNV16350x648725f4
      _al_glGetQueryIndexediv16360x64872b40
      _al_glGetQueryObjecti64v16370x64872cc4
      _al_glGetQueryObjecti64vEXT16380x64871f48
      _al_glGetQueryObjectiv16390x648733ec
      _al_glGetQueryObjectivARB16400x64872ed4
      _al_glGetQueryObjectui64v16410x64872cc0
      _al_glGetQueryObjectui64vEXT16420x64871f44
      _al_glGetQueryObjectuiv16430x648733e8
      _al_glGetQueryObjectuivARB16440x64872ed0
      _al_glGetQueryiv16450x648733f0
      _al_glGetQueryivARB16460x64872ed8
      _al_glGetRenderbufferParameteriv16470x64872e00
      _al_glGetRenderbufferParameterivEXT16480x64871f88
      _al_glGetSamplerParameterIfv16490x64872ccc
      _al_glGetSamplerParameterIiv16500x64872cd4
      _al_glGetSamplerParameterfv16510x64872cd0
      _al_glGetSamplerParameteriv16520x64872cd8
      _al_glGetSeparableFilter16530x648735cc
      _al_glGetSeparableFilterEXT16540x64872ab4
      _al_glGetShaderInfoLog16550x64873350
      _al_glGetShaderSource16560x64873334
      _al_glGetShaderSourceARB16570x64872e34
      _al_glGetShaderfv16580x64873360
      _al_glGetShaderiv16590x6487335c
      _al_glGetSharpenTexFuncSGIS16600x64872a48
      _al_glGetStringi16610x64873170
      _al_glGetSubroutineIndex16620x64872b8c
      _al_glGetSubroutineUniformLocation16630x64872b90
      _al_glGetSynciv16640x64872d48
      _al_glGetTexBumpParameterfvATI16650x64872504
      _al_glGetTexBumpParameterivATI16660x64872508
      _al_glGetTexEnvxvOES16670x64872018
      _al_glGetTexFilterFuncSGIS16680x64872b2c
      _al_glGetTexGenxvOES16690x648720ac
      _al_glGetTexLevelParameterxvOES16700x64872028
      _al_glGetTexParameterIiv16710x64873188
      _al_glGetTexParameterIuiv16720x64873184
      _al_glGetTexParameterPointervAPPLE16730x64871a58
      _al_glGetTexParameterxvOES16740x6487202c
      _al_glGetTextureImageEXT16750x64871d30
      _al_glGetTextureLevelParameterfvEXT16760x64871d24
      _al_glGetTextureLevelParameterivEXT16770x64871d20
      _al_glGetTextureParameterIivEXT16780x64871be0
      _al_glGetTextureParameterIuivEXT16790x64871bdc
      _al_glGetTextureParameterfvEXT16800x64871d2c
      _al_glGetTextureParameterivEXT16810x64871d28
      _al_glGetTrackMatrixivNV16820x648725ec
      _al_glGetTransformFeedbackVarying16830x64873228
      _al_glGetTransformFeedbackVaryingEXT16840x64871db8
      _al_glGetTransformFeedbackVaryingNV16850x64871de0
      _al_glGetUniformBlockIndex16860x64872d88
      _al_glGetUniformBufferSizeEXT16870x64871f2c
      _al_glGetUniformIndices16880x64872d94
      _al_glGetUniformLocation16890x64873344
      _al_glGetUniformLocationARB16900x64872e44
      _al_glGetUniformOffsetEXT16910x64871f28
      _al_glGetUniformSubroutineuiv16920x64872b78
      _al_glGetUniformdv16930x64872bd8
      _al_glGetUniformfv16940x6487333c
      _al_glGetUniformfvARB16950x64872e3c
      _al_glGetUniformiv16960x64873338
      _al_glGetUniformivARB16970x64872e38
      _al_glGetUniformui64vNV16980x648719c4
      _al_glGetUniformuiv16990x648731bc
      _al_glGetUniformuivEXT17000x64871e7c
      _al_glGetVariantArrayObjectfvATI17010x64872498
      _al_glGetVariantArrayObjectivATI17020x64872494
      _al_glGetVariantBooleanvEXT17030x64872410
      _al_glGetVariantFloatvEXT17040x64872408
      _al_glGetVariantIntegervEXT17050x6487240c
      _al_glGetVariantPointervEXT17060x64872404
      _al_glGetVaryingLocationNV17070x64871dec
      _al_glGetVertexAttribArrayObjectfvATI17080x648721bc
      _al_glGetVertexAttribArrayObjectivATI17090x648721b8
      _al_glGetVertexAttribIiv17100x648731c4
      _al_glGetVertexAttribIivEXT17110x64871ea4
      _al_glGetVertexAttribIuiv17120x648731c0
      _al_glGetVertexAttribIuivEXT17130x64871ea0
      _al_glGetVertexAttribPointerv17140x6487327c
      _al_glGetVertexAttribPointervARB17150x64872f20
      _al_glGetVertexAttribPointervNV17160x648725dc
      _al_glGetVertexAttribdv17170x64873288
      _al_glGetVertexAttribdvARB17180x64872f2c
      _al_glGetVertexAttribdvNV17190x648725e8
      _al_glGetVertexAttribfv17200x64873284
      _al_glGetVertexAttribfvARB17210x64872f28
      _al_glGetVertexAttribfvNV17220x648725e4
      _al_glGetVertexAttribiv17230x64873280
      _al_glGetVertexAttribivARB17240x64872f24
      _al_glGetVertexAttribivNV17250x648725e0
      _al_glGetVideoCaptureStreamdvNV17260x64871a10
      _al_glGetVideoCaptureStreamfvNV17270x64871a14
      _al_glGetVideoCaptureStreamivNV17280x64871a18
      _al_glGetVideoCaptureivNV17290x64871a1c
      _al_glGlobalAlphaFactorbSUN17300x64872804
      _al_glGlobalAlphaFactordSUN17310x648727f4
      _al_glGlobalAlphaFactorfSUN17320x648727f8
      _al_glGlobalAlphaFactoriSUN17330x648727fc
      _al_glGlobalAlphaFactorsSUN17340x64872800
      _al_glGlobalAlphaFactorubSUN17350x648727f0
      _al_glGlobalAlphaFactoruiSUN17360x648727e8
      _al_glGlobalAlphaFactorusSUN17370x648727ec
      _al_glHintPGI17380x64872998
      _al_glHistogram17390x648735ac
      _al_glHistogramEXT17400x64872af0
      _al_glIglooInterfaceSGIX17410x6487265c
      _al_glImageTransformParameterfHP17420x648729b0
      _al_glImageTransformParameterfvHP17430x648729a8
      _al_glImageTransformParameteriHP17440x648729b4
      _al_glImageTransformParameterivHP17450x648729ac
      _al_glIndexFormatNV17460x648719a8
      _al_glIndexFuncEXT17470x64872968
      _al_glIndexMaterialEXT17480x6487296c
      _al_glIndexPointerEXT17490x64872a28
      _al_glIndexxOES17500x648720ec
      _al_glIndexxvOES17510x648720e8
      _al_glInsertComponentEXT17520x64872468
      _al_glInstrumentsBufferSGIX17530x648729f0
      _al_glIsAsyncMarkerSGIX17540x648728e8
      _al_glIsBuffer17550x64873424
      _al_glIsBufferARB17560x64872f0c
      _al_glIsBufferResidentNV17570x648719e8
      _al_glIsEnabledIndexedEXT17580x64871f10
      _al_glIsEnabledi17590x64873240
      _al_glIsFenceAPPLE17600x648722dc
      _al_glIsFenceNV17610x64872650
      _al_glIsFramebuffer17620x64872dfc
      _al_glIsFramebufferEXT17630x64871f84
      _al_glIsNamedBufferResidentNV17640x648719dc
      _al_glIsNamedStringARB17650x64872d14
      _al_glIsObjectBufferATI17660x648724bc
      _al_glIsOcclusionQueryNV17670x6487231c
      _al_glIsProgram17680x648733c0
      _al_glIsProgramARB17690x64872f1c
      _al_glIsProgramNV17700x648725d8
      _al_glIsQuery17710x648733fc
      _al_glIsQueryARB17720x64872ee4
      _al_glIsRenderbuffer17730x64872e14
      _al_glIsRenderbufferEXT17740x64871f9c
      _al_glIsSampler17750x64872cf8
      _al_glIsShader17760x648733bc
      _al_glIsSync17770x64872d5c
      _al_glIsTextureEXT17780x64872a5c
      _al_glIsTransformFeedback17790x64872b5c
      _al_glIsTransformFeedbackNV17800x64871ab4
      _al_glIsVariantEnabledEXT17810x64872414
      _al_glIsVertexArray17820x64872d98
      _al_glIsVertexArrayAPPLE17830x648722bc
      _al_glIsVertexAttribEnabledAPPLE17840x64871a4c
      _al_glLightEnviSGIX17850x64872910
      _al_glLightModelxOES17860x64872070
      _al_glLightModelxvOES17870x6487206c
      _al_glLightxOES17880x6487207c
      _al_glLightxvOES17890x64872078
      _al_glLineWidthxOES17900x64872064
      _al_glLinkProgram17910x648733b8
      _al_glLinkProgramARB17920x64872eac
      _al_glListParameterfSGIX17930x6487297c
      _al_glListParameterfvSGIX17940x64872978
      _al_glListParameteriSGIX17950x64872974
      _al_glListParameterivSGIX17960x64872970
      _al_glLoadIdentityDeformationMapSGIX17970x648729c8
      _al_glLoadMatrixxOES17980x648720d8
      _al_glLoadProgramNV17990x648725d4
      _al_glLoadTransposeMatrixd18000x64873510
      _al_glLoadTransposeMatrixdARB18010x648730c0
      _al_glLoadTransposeMatrixf18020x64873514
      _al_glLoadTransposeMatrixfARB18030x648730c4
      _al_glLoadTransposeMatrixxOES18040x648720d0
      _al_glLockArraysEXT18050x64872964
      _al_glMakeBufferNonResidentNV18060x648719ec
      _al_glMakeBufferResidentNV18070x648719f0
      _al_glMakeNamedBufferNonResidentNV18080x648719e0
      _al_glMakeNamedBufferResidentNV18090x648719e4
      _al_glMap1xOES18100x64871ff0
      _al_glMap2xOES18110x64871fec
      _al_glMapBuffer18120x64873414
      _al_glMapBufferARB18130x64872efc
      _al_glMapBufferRange18140x64872db0
      _al_glMapControlPointsNV18150x6487263c
      _al_glMapGrid1xOES18160x64871fe8
      _al_glMapGrid2xOES18170x64871fe4
      _al_glMapNamedBufferEXT18180x64871b3c
      _al_glMapObjectBufferATI18190x648721c8
      _al_glMapParameterfvNV18200x64872634
      _al_glMapParameterivNV18210x64872638
      _al_glMapVertexAttrib1dAPPLE18220x64871a48
      _al_glMapVertexAttrib1fAPPLE18230x64871a44
      _al_glMapVertexAttrib2dAPPLE18240x64871a40
      _al_glMapVertexAttrib2fAPPLE18250x64871a3c
      _al_glMaterialxOES18260x64872088
      _al_glMaterialxvOES18270x64872084
      _al_glMatrixFrustumEXT18280x64871d80
      _al_glMatrixIndexPointerARB18290x64873054
      _al_glMatrixIndexubvARB18300x64873060
      _al_glMatrixIndexuivARB18310x64873058
      _al_glMatrixIndexusvARB18320x6487305c
      _al_glMatrixLoadIdentityEXT18330x64871d9c
      _al_glMatrixLoadTransposedEXT18340x64871d6c
      _al_glMatrixLoadTransposefEXT18350x64871d70
      _al_glMatrixLoaddEXT18360x64871da8
      _al_glMatrixLoadfEXT18370x64871dac
      _al_glMatrixMultTransposedEXT18380x64871d64
      _al_glMatrixMultTransposefEXT18390x64871d68
      _al_glMatrixMultdEXT18400x64871da0
      _al_glMatrixMultfEXT18410x64871da4
      _al_glMatrixOrthoEXT18420x64871d7c
      _al_glMatrixPopEXT18430x64871d78
      _al_glMatrixPushEXT18440x64871d74
      _al_glMatrixRotatedEXT18450x64871d94
      _al_glMatrixRotatefEXT18460x64871d98
      _al_glMatrixScaledEXT18470x64871d8c
      _al_glMatrixScalefEXT18480x64871d90
      _al_glMatrixTranslatedEXT18490x64871d84
      _al_glMatrixTranslatefEXT18500x64871d88
      _al_glMinSampleShading18510x64872d24
      _al_glMinmax18520x648735a8
      _al_glMinmaxEXT18530x64872aec
      _al_glMultMatrixxOES18540x648720d4
      _al_glMultTransposeMatrixd18550x64873508
      _al_glMultTransposeMatrixdARB18560x648730b8
      _al_glMultTransposeMatrixf18570x6487350c
      _al_glMultTransposeMatrixfARB18580x648730bc
      _al_glMultTransposeMatrixxOES18590x648720cc
      _al_glMultiDrawArrays18600x648734cc
      _al_glMultiDrawArraysEXT18610x6487287c
      _al_glMultiDrawElementArrayAPPLE18620x648722f0
      _al_glMultiDrawElements18630x648734c8
      _al_glMultiDrawElementsBaseVertex18640x64872d68
      _al_glMultiDrawElementsEXT18650x64872878
      _al_glMultiDrawRangeElementArrayAPPLE18660x648722ec
      _al_glMultiModeDrawArraysIBM18670x64872674
      _al_glMultiModeDrawElementsIBM18680x64872670
      _al_glMultiTexBufferEXT18690x64871b24
      _al_glMultiTexCoord1bOES18700x6487217c
      _al_glMultiTexCoord1bvOES18710x6487216c
      _al_glMultiTexCoord1d18720x64873594
      _al_glMultiTexCoord1dARB18730x64873144
      _al_glMultiTexCoord1dv18740x64873590
      _al_glMultiTexCoord1dvARB18750x64873140
      _al_glMultiTexCoord1f18760x6487358c
      _al_glMultiTexCoord1fARB18770x6487313c
      _al_glMultiTexCoord1fv18780x64873588
      _al_glMultiTexCoord1fvARB18790x64873138
      _al_glMultiTexCoord1hNV18800x64872240
      _al_glMultiTexCoord1hvNV18810x6487223c
      _al_glMultiTexCoord1i18820x64873584
      _al_glMultiTexCoord1iARB18830x64873134
      _al_glMultiTexCoord1iv18840x64873580
      _al_glMultiTexCoord1ivARB18850x64873130
      _al_glMultiTexCoord1s18860x6487357c
      _al_glMultiTexCoord1sARB18870x6487312c
      _al_glMultiTexCoord1sv18880x64873578
      _al_glMultiTexCoord1svARB18890x64873128
      _al_glMultiTexCoord1xOES18900x6487211c
      _al_glMultiTexCoord1xvOES18910x6487210c
      _al_glMultiTexCoord2bOES18920x64872178
      _al_glMultiTexCoord2bvOES18930x64872168
      _al_glMultiTexCoord2d18940x64873574
      _al_glMultiTexCoord2dARB18950x64873124
      _al_glMultiTexCoord2dv18960x64873570
      _al_glMultiTexCoord2dvARB18970x64873120
      _al_glMultiTexCoord2f18980x6487356c
      _al_glMultiTexCoord2fARB18990x6487311c
      _al_glMultiTexCoord2fv19000x64873568
      _al_glMultiTexCoord2fvARB19010x64873118
      _al_glMultiTexCoord2hNV19020x64872238
      _al_glMultiTexCoord2hvNV19030x64872234
      _al_glMultiTexCoord2i19040x64873564
      _al_glMultiTexCoord2iARB19050x64873114
      _al_glMultiTexCoord2iv19060x64873560
      _al_glMultiTexCoord2ivARB19070x64873110
      _al_glMultiTexCoord2s19080x6487355c
      _al_glMultiTexCoord2sARB19090x6487310c
      _al_glMultiTexCoord2sv19100x64873558
      _al_glMultiTexCoord2svARB19110x64873108
      _al_glMultiTexCoord2xOES19120x64872118
      _al_glMultiTexCoord2xvOES19130x64872108
      _al_glMultiTexCoord3bOES19140x64872174
      _al_glMultiTexCoord3bvOES19150x64872164
      _al_glMultiTexCoord3d19160x64873554
      _al_glMultiTexCoord3dARB19170x64873104
      _al_glMultiTexCoord3dv19180x64873550
      _al_glMultiTexCoord3dvARB19190x64873100
      _al_glMultiTexCoord3f19200x6487354c
      _al_glMultiTexCoord3fARB19210x648730fc
      _al_glMultiTexCoord3fv19220x64873548
      _al_glMultiTexCoord3fvARB19230x648730f8
      _al_glMultiTexCoord3hNV19240x64872230
      _al_glMultiTexCoord3hvNV19250x6487222c
      _al_glMultiTexCoord3i19260x64873544
      _al_glMultiTexCoord3iARB19270x648730f4
      _al_glMultiTexCoord3iv19280x64873540
      _al_glMultiTexCoord3ivARB19290x648730f0
      _al_glMultiTexCoord3s19300x6487353c
      _al_glMultiTexCoord3sARB19310x648730ec
      _al_glMultiTexCoord3sv19320x64873538
      _al_glMultiTexCoord3svARB19330x648730e8
      _al_glMultiTexCoord3xOES19340x64872114
      _al_glMultiTexCoord3xvOES19350x64872104
      _al_glMultiTexCoord4bOES19360x64872170
      _al_glMultiTexCoord4bvOES19370x64872160
      _al_glMultiTexCoord4d19380x64873534
      _al_glMultiTexCoord4dARB19390x648730e4
      _al_glMultiTexCoord4dv19400x64873530
      _al_glMultiTexCoord4dvARB19410x648730e0
      _al_glMultiTexCoord4f19420x6487352c
      _al_glMultiTexCoord4fARB19430x648730dc
      _al_glMultiTexCoord4fv19440x64873528
      _al_glMultiTexCoord4fvARB19450x648730d8
      _al_glMultiTexCoord4hNV19460x64872228
      _al_glMultiTexCoord4hvNV19470x64872224
      _al_glMultiTexCoord4i19480x64873524
      _al_glMultiTexCoord4iARB19490x648730d4
      _al_glMultiTexCoord4iv19500x64873520
      _al_glMultiTexCoord4ivARB19510x648730d0
      _al_glMultiTexCoord4s19520x6487351c
      _al_glMultiTexCoord4sARB19530x648730cc
      _al_glMultiTexCoord4sv19540x64873518
      _al_glMultiTexCoord4svARB19550x648730c8
      _al_glMultiTexCoord4xOES19560x64872110
      _al_glMultiTexCoord4xvOES19570x64872100
      _al_glMultiTexCoordP1ui19580x64872c84
      _al_glMultiTexCoordP1uiv19590x64872c80
      _al_glMultiTexCoordP2ui19600x64872c7c
      _al_glMultiTexCoordP2uiv19610x64872c78
      _al_glMultiTexCoordP3ui19620x64872c74
      _al_glMultiTexCoordP3uiv19630x64872c70
      _al_glMultiTexCoordP4ui19640x64872c6c
      _al_glMultiTexCoordP4uiv19650x64872c68
      _al_glMultiTexCoordPointerEXT19660x64871cb4
      _al_glMultiTexEnvfEXT19670x64871cb0
      _al_glMultiTexEnvfvEXT19680x64871cac
      _al_glMultiTexEnviEXT19690x64871ca8
      _al_glMultiTexEnvivEXT19700x64871ca4
      _al_glMultiTexGendEXT19710x64871ca0
      _al_glMultiTexGendvEXT19720x64871c9c
      _al_glMultiTexGenfEXT19730x64871c98
      _al_glMultiTexGenfvEXT19740x64871c94
      _al_glMultiTexGeniEXT19750x64871c90
      _al_glMultiTexGenivEXT19760x64871c8c
      _al_glMultiTexImage1DEXT19770x64871d00
      _al_glMultiTexImage2DEXT19780x64871cfc
      _al_glMultiTexImage3DEXT19790x64871ccc
      _al_glMultiTexParameterIivEXT19800x64871bd8
      _al_glMultiTexParameterIuivEXT19810x64871bd4
      _al_glMultiTexParameterfEXT19820x64871d10
      _al_glMultiTexParameterfvEXT19830x64871d0c
      _al_glMultiTexParameteriEXT19840x64871d08
      _al_glMultiTexParameterivEXT19850x64871d04
      _al_glMultiTexRenderbufferEXT19860x64871ad0
      _al_glMultiTexSubImage1DEXT19870x64871cf8
      _al_glMultiTexSubImage2DEXT19880x64871cf4
      _al_glMultiTexSubImage3DEXT19890x64871cc8
      _al_glNamedBufferDataEXT19900x64871b44
      _al_glNamedBufferSubDataEXT19910x64871b40
      _al_glNamedFramebufferRenderbufferEXT19920x64871b08
      _al_glNamedFramebufferTexture1DEXT19930x64871b14
      _al_glNamedFramebufferTexture2DEXT19940x64871b10
      _al_glNamedFramebufferTexture3DEXT19950x64871b0c
      _al_glNamedFramebufferTextureEXT19960x64871ae0
      _al_glNamedFramebufferTextureFaceEXT19970x64871ad8
      _al_glNamedFramebufferTextureLayerEXT19980x64871adc
      _al_glNamedProgramLocalParameter4dEXT19990x64871c2c
      _al_glNamedProgramLocalParameter4dvEXT20000x64871c28
      _al_glNamedProgramLocalParameter4fEXT20010x64871c24
      _al_glNamedProgramLocalParameter4fvEXT20020x64871c20
      _al_glNamedProgramLocalParameterI4iEXT20030x64871c08
      _al_glNamedProgramLocalParameterI4ivEXT20040x64871c04
      _al_glNamedProgramLocalParameterI4uiEXT20050x64871bfc
      _al_glNamedProgramLocalParameterI4uivEXT20060x64871bf8
      _al_glNamedProgramLocalParameters4fvEXT20070x64871c0c
      _al_glNamedProgramLocalParametersI4ivEXT20080x64871c00
      _al_glNamedProgramLocalParametersI4uivEXT20090x64871bf4
      _al_glNamedProgramStringEXT20100x64871c30
      _al_glNamedRenderbufferStorageEXT20110x64871b20
      _al_glNamedRenderbufferStorageMultisampleCoverageEXT20120x64871ae4
      _al_glNamedRenderbufferStorageMultisampleEXT20130x64871ae8
      _al_glNamedStringARB20140x64872d20
      _al_glNewObjectBufferATI20150x648724c0
      _al_glNormal3fVertex3fSUN20160x648727b0
      _al_glNormal3fVertex3fvSUN20170x648727ac
      _al_glNormal3hNV20180x64872278
      _al_glNormal3hvNV20190x64872274
      _al_glNormal3xOES20200x64872144
      _al_glNormal3xvOES20210x64872140
      _al_glNormalFormatNV20220x648719b0
      _al_glNormalP3ui20230x64872c64
      _al_glNormalP3uiv20240x64872c60
      _al_glNormalPointerEXT20250x64872a24
      _al_glNormalPointervINTEL20260x648728e0
      _al_glNormalStream3bATI20270x64872368
      _al_glNormalStream3bvATI20280x64872364
      _al_glNormalStream3dATI20290x64872348
      _al_glNormalStream3dvATI20300x64872344
      _al_glNormalStream3fATI20310x64872350
      _al_glNormalStream3fvATI20320x6487234c
      _al_glNormalStream3iATI20330x64872358
      _al_glNormalStream3ivATI20340x64872354
      _al_glNormalStream3sATI20350x64872360
      _al_glNormalStream3svATI20360x6487235c
      _al_glObjectPurgeableAPPLE20370x64871a38
      _al_glObjectUnpurgeableAPPLE20380x64871a34
      _al_glOrthofOES20390x64871fb8
      _al_glOrthoxOES20400x648720b8
      _al_glPNTrianglesfATI20410x648724c4
      _al_glPNTrianglesiATI20420x648724c8
      _al_glPassTexCoordATI20430x648724ec
      _al_glPassThroughxOES20440x64871fc8
      _al_glPatchParameterfv20450x64872b6c
      _al_glPatchParameteri20460x64872b70
      _al_glPauseTransformFeedback20470x64872b58
      _al_glPauseTransformFeedbackNV20480x64871ab0
      _al_glPixelDataRangeNV20490x648721d8
      _al_glPixelMapx20500x64872054
      _al_glPixelStorex20510x6487205c
      _al_glPixelTexGenParameterfSGIS20520x64872a84
      _al_glPixelTexGenParameterfvSGIS20530x64872a80
      _al_glPixelTexGenParameteriSGIS20540x64872a8c
      _al_glPixelTexGenParameterivSGIS20550x64872a88
      _al_glPixelTexGenSGIX20560x64872a90
      _al_glPixelTransferxOES20570x64872058
      _al_glPixelTransformParameterfEXT20580x648728d0
      _al_glPixelTransformParameterfvEXT20590x648728c8
      _al_glPixelTransformParameteriEXT20600x648728d4
      _al_glPixelTransformParameterivEXT20610x648728cc
      _al_glPixelZoomxOES20620x6487203c
      _al_glPointParameterf20630x648734c4
      _al_glPointParameterfARB20640x64873094
      _al_glPointParameterfEXT20650x64872a04
      _al_glPointParameterfSGIS20660x648729fc
      _al_glPointParameterfv20670x648734c0
      _al_glPointParameterfvARB20680x64873090
      _al_glPointParameterfvEXT20690x64872a00
      _al_glPointParameterfvSGIS20700x648729f8
      _al_glPointParameteri20710x648734bc
      _al_glPointParameteriNV20720x64872308
      _al_glPointParameteriv20730x648734b8
      _al_glPointParameterivNV20740x64872304
      _al_glPointSizexOES20750x64872068
      _al_glPollAsyncSGIX20760x648728f4
      _al_glPollInstrumentsSGIX20770x648729ec
      _al_glPolygonOffsetEXT20780x64872b38
      _al_glPolygonOffsetxOES20790x64872060
      _al_glPrimitiveRestartIndex20800x64873160
      _al_glPrimitiveRestartIndexNV20810x648721cc
      _al_glPrimitiveRestartNV20820x648721d0
      _al_glPrioritizeTexturesEXT20830x64872a58
      _al_glPrioritizeTexturesxOES20840x64872024
      _al_glProgramBufferParametersIivNV20850x64871e10
      _al_glProgramBufferParametersIuivNV20860x64871e0c
      _al_glProgramBufferParametersfvNV20870x64871e14
      _al_glProgramEnvParameter4dARB20880x64872f64
      _al_glProgramEnvParameter4dvARB20890x64872f60
      _al_glProgramEnvParameter4fARB20900x64872f5c
      _al_glProgramEnvParameter4fvARB20910x64872f58
      _al_glProgramEnvParameterI4iNV20920x64871e3c
      _al_glProgramEnvParameterI4ivNV20930x64871e38
      _al_glProgramEnvParameterI4uiNV20940x64871e30
      _al_glProgramEnvParameterI4uivNV20950x64871e2c
      _al_glProgramEnvParameters4fvEXT20960x64871f40
      _al_glProgramEnvParametersI4ivNV20970x64871e34
      _al_glProgramEnvParametersI4uivNV20980x64871e28
      _al_glProgramLocalParameter4dARB20990x64872f54
      _al_glProgramLocalParameter4dvARB21000x64872f50
      _al_glProgramLocalParameter4fARB21010x64872f4c
      _al_glProgramLocalParameter4fvARB21020x64872f48
      _al_glProgramLocalParameterI4iNV21030x64871e54
      _al_glProgramLocalParameterI4ivNV21040x64871e50
      _al_glProgramLocalParameterI4uiNV21050x64871e48
      _al_glProgramLocalParameterI4uivNV21060x64871e44
      _al_glProgramLocalParameters4fvEXT21070x64871f3c
      _al_glProgramLocalParametersI4ivNV21080x64871e4c
      _al_glProgramLocalParametersI4uivNV21090x64871e40
      _al_glProgramNamedParameter4dNV21100x648722a4
      _al_glProgramNamedParameter4dvNV21110x6487229c
      _al_glProgramNamedParameter4fNV21120x648722a8
      _al_glProgramNamedParameter4fvNV21130x648722a0
      _al_glProgramParameter4dNV21140x648725d0
      _al_glProgramParameter4dvNV21150x648725cc
      _al_glProgramParameter4fNV21160x648725c8
      _al_glProgramParameter4fvNV21170x648725c4
      _al_glProgramParameteri21180x64873154
      _al_glProgramParameteriARB21190x64872dc4
      _al_glProgramParameteriEXT21200x64871f04
      _al_glProgramParameters4dvNV21210x648725c0
      _al_glProgramParameters4fvNV21220x648725bc
      _al_glProgramStringARB21230x64872f74
      _al_glProgramUniform1dEXT21240x64872bd4
      _al_glProgramUniform1dvEXT21250x64872bc4
      _al_glProgramUniform1fEXT21260x64871bc8
      _al_glProgramUniform1fvEXT21270x64871ba8
      _al_glProgramUniform1iEXT21280x64871bb8
      _al_glProgramUniform1ivEXT21290x64871b98
      _al_glProgramUniform1uiEXT21300x64871b64
      _al_glProgramUniform1uivEXT21310x64871b54
      _al_glProgramUniform2dEXT21320x64872bd0
      _al_glProgramUniform2dvEXT21330x64872bc0
      _al_glProgramUniform2fEXT21340x64871bc4
      _al_glProgramUniform2fvEXT21350x64871ba4
      _al_glProgramUniform2iEXT21360x64871bb4
      _al_glProgramUniform2ivEXT21370x64871b94
      _al_glProgramUniform2uiEXT21380x64871b60
      _al_glProgramUniform2uivEXT21390x64871b50
      _al_glProgramUniform3dEXT21400x64872bcc
      _al_glProgramUniform3dvEXT21410x64872bbc
      _al_glProgramUniform3fEXT21420x64871bc0
      _al_glProgramUniform3fvEXT21430x64871ba0
      _al_glProgramUniform3iEXT21440x64871bb0
      _al_glProgramUniform3ivEXT21450x64871b90
      _al_glProgramUniform3uiEXT21460x64871b5c
      _al_glProgramUniform3uivEXT21470x64871b4c
      _al_glProgramUniform4dEXT21480x64872bc8
      _al_glProgramUniform4dvEXT21490x64872bb8
      _al_glProgramUniform4fEXT21500x64871bbc
      _al_glProgramUniform4fvEXT21510x64871b9c
      _al_glProgramUniform4iEXT21520x64871bac
      _al_glProgramUniform4ivEXT21530x64871b8c
      _al_glProgramUniform4uiEXT21540x64871b58
      _al_glProgramUniform4uivEXT21550x64871b48
      _al_glProgramUniformMatrix2dvEXT21560x64872bb4
      _al_glProgramUniformMatrix2fvEXT21570x64871b88
      _al_glProgramUniformMatrix2x3dvEXT21580x64872ba8
      _al_glProgramUniformMatrix2x3fvEXT21590x64871b7c
      _al_glProgramUniformMatrix2x4dvEXT21600x64872ba4
      _al_glProgramUniformMatrix2x4fvEXT21610x64871b74
      _al_glProgramUniformMatrix3dvEXT21620x64872bb0
      _al_glProgramUniformMatrix3fvEXT21630x64871b84
      _al_glProgramUniformMatrix3x2dvEXT21640x64872ba0
      _al_glProgramUniformMatrix3x2fvEXT21650x64871b78
      _al_glProgramUniformMatrix3x4dvEXT21660x64872b9c
      _al_glProgramUniformMatrix3x4fvEXT21670x64871b6c
      _al_glProgramUniformMatrix4dvEXT21680x64872bac
      _al_glProgramUniformMatrix4fvEXT21690x64871b80
      _al_glProgramUniformMatrix4x2dvEXT21700x64872b98
      _al_glProgramUniformMatrix4x2fvEXT21710x64871b70
      _al_glProgramUniformMatrix4x3dvEXT21720x64872b94
      _al_glProgramUniformMatrix4x3fvEXT21730x64871b68
      _al_glProgramUniformui64NV21740x648719c0
      _al_glProgramUniformui64vNV21750x648719bc
      _al_glProgramVertexLimitNV21760x64871e58
      _al_glProvokingVertex21770x64872d64
      _al_glProvokingVertexEXT21780x64871a70
      _al_glPushClientAttribDefaultEXT21790x64871db0
      _al_glQueryCounter21800x64872cc8
      _al_glQueryMatrixxOES21810x64871fa8
      _al_glRasterPos2xOES21820x648720a0
      _al_glRasterPos2xvOES21830x64872094
      _al_glRasterPos3xOES21840x6487209c
      _al_glRasterPos3xvOES21850x64872090
      _al_glRasterPos4xOES21860x64872098
      _al_glRasterPos4xvOES21870x6487208c
      _al_glReadInstrumentsSGIX21880x648729e8
      _al_glRectxOES21890x648720e4
      _al_glRectxvOES21900x648720e0
      _al_glReferencePlaneSGIX21910x648729c4
      _al_glRenderbufferStorage21920x64872e04
      _al_glRenderbufferStorageEXT21930x64871f8c
      _al_glRenderbufferStorageMultisample21940x64872dcc
      _al_glRenderbufferStorageMultisampleEXT21950x64871f4c
      _al_glRenderbufferStorageMultsampleCoverageNV21960x64871e5c
      _al_glReplacementCodePointerSUN21970x648727cc
      _al_glReplacementCodeubSUN21980x648727dc
      _al_glReplacementCodeubvSUN21990x648727d0
      _al_glReplacementCodeuiColor3fVertex3fSUN22000x64872758
      _al_glReplacementCodeuiColor3fVertex3fvSUN22010x64872754
      _al_glReplacementCodeuiColor4fNormal3fVertex3fSUN22020x64872748
      _al_glReplacementCodeuiColor4fNormal3fVertex3fvSUN22030x64872744
      _al_glReplacementCodeuiColor4ubVertex3fSUN22040x64872760
      _al_glReplacementCodeuiColor4ubVertex3fvSUN22050x6487275c
      _al_glReplacementCodeuiNormal3fVertex3fSUN22060x64872750
      _al_glReplacementCodeuiNormal3fVertex3fvSUN22070x6487274c
      _al_glReplacementCodeuiSUN22080x648727e4
      _al_glReplacementCodeuiTexCoord2fColor4fNormal3fVertex3fSUN22090x64872730
      _al_glReplacementCodeuiTexCoord2fColor4fNormal3fVertex3fvSUN22100x6487272c
      _al_glReplacementCodeuiTexCoord2fNormal3fVertex3fSUN22110x64872738
      _al_glReplacementCodeuiTexCoord2fNormal3fVertex3fvSUN22120x64872734
      _al_glReplacementCodeuiTexCoord2fVertex3fSUN22130x64872740
      _al_glReplacementCodeuiTexCoord2fVertex3fvSUN22140x6487273c
      _al_glReplacementCodeuiVertex3fSUN22150x64872768
      _al_glReplacementCodeuiVertex3fvSUN22160x64872764
      _al_glReplacementCodeuivSUN22170x648727d8
      _al_glReplacementCodeusSUN22180x648727e0
      _al_glReplacementCodeusvSUN22190x648727d4
      _al_glRequestResidentProgramsNV22200x648725b8
      _al_glResetHistogram22210x648735a4
      _al_glResetHistogramEXT22220x64872ae8
      _al_glResetMinmax22230x648735a0
      _al_glResetMinmaxEXT22240x64872ae4
      _al_glResizeBuffersMESA22250x648726d8
      _al_glResumeTransformFeedback22260x64872b54
      _al_glResumeTransformFeedbackNV22270x64871aac
      _al_glRotatexOES22280x648720c8
      _al_glSampleCoverage22290x64873504
      _al_glSampleCoverageARB22300x648730b4
      _al_glSampleCoverageOES22310x6487200c
      _al_glSampleMapATI22320x648724e8
      _al_glSampleMaskEXT22330x64872668
      _al_glSampleMaskIndexedNV22340x64871ac8
      _al_glSampleMaskSGIS22350x64872a44
      _al_glSampleMaski22360x64872d38
      _al_glSamplePatternEXT22370x64872664
      _al_glSamplePatternSGIS22380x64872a40
      _al_glSamplerParameterIiv22390x64872ce0
      _al_glSamplerParameterIuiv22400x64872cdc
      _al_glSamplerParameterf22410x64872ce8
      _al_glSamplerParameterfv22420x64872ce4
      _al_glSamplerParameteri22430x64872cf0
      _al_glSamplerParameteriv22440x64872cec
      _al_glScalexOES22450x648720c4
      _al_glSecondaryColor3b22460x648734b4
      _al_glSecondaryColor3bEXT22470x648728c4
      _al_glSecondaryColor3bv22480x648734b0
      _al_glSecondaryColor3bvEXT22490x648728c0
      _al_glSecondaryColor3d22500x648734ac
      _al_glSecondaryColor3dEXT22510x648728bc
      _al_glSecondaryColor3dv22520x648734a8
      _al_glSecondaryColor3dvEXT22530x648728b8
      _al_glSecondaryColor3f22540x648734a4
      _al_glSecondaryColor3fEXT22550x648728b4
      _al_glSecondaryColor3fv22560x648734a0
      _al_glSecondaryColor3fvEXT22570x648728b0
      _al_glSecondaryColor3hNV22580x64872218
      _al_glSecondaryColor3hvNV22590x64872214
      _al_glSecondaryColor3i22600x6487349c
      _al_glSecondaryColor3iEXT22610x648728ac
      _al_glSecondaryColor3iv22620x64873498
      _al_glSecondaryColor3ivEXT22630x648728a8
      _al_glSecondaryColor3s22640x64873494
      _al_glSecondaryColor3sEXT22650x648728a4
      _al_glSecondaryColor3sv22660x64873490
      _al_glSecondaryColor3svEXT22670x648728a0
      _al_glSecondaryColor3ub22680x6487348c
      _al_glSecondaryColor3ubEXT22690x6487289c
      _al_glSecondaryColor3ubv22700x64873488
      _al_glSecondaryColor3ubvEXT22710x64872898
      _al_glSecondaryColor3ui22720x64873484
      _al_glSecondaryColor3uiEXT22730x64872894
      _al_glSecondaryColor3uiv22740x64873480
      _al_glSecondaryColor3uivEXT22750x64872890
      _al_glSecondaryColor3us22760x6487347c
      _al_glSecondaryColor3usEXT22770x6487288c
      _al_glSecondaryColor3usv22780x64873478
      _al_glSecondaryColor3usvEXT22790x64872888
      _al_glSecondaryColorFormatNV22800x6487199c
      _al_glSecondaryColorP3ui22810x64872c4c
      _al_glSecondaryColorP3uiv22820x64872c48
      _al_glSecondaryColorPointer22830x64873474
      _al_glSecondaryColorPointerEXT22840x64872884
      _al_glSelectPerfMonitorCountersAMD22850x64871a88
      _al_glSeparableFilter2D22860x648735c8
      _al_glSeparableFilter2DEXT22870x64872ab0
      _al_glSetFenceAPPLE22880x648722e0
      _al_glSetFenceNV22890x64872640
      _al_glSetFragmentShaderConstantATI22900x648724cc
      _al_glSetInvariantEXT22910x6487245c
      _al_glSetLocalConstantEXT22920x64872458
      _al_glShaderOp1EXT22930x6487247c
      _al_glShaderOp2EXT22940x64872478
      _al_glShaderOp3EXT22950x64872474
      _al_glShaderSource22960x648733c8
      _al_glShaderSourceARB22970x64872ebc
      _al_glSharpenTexFuncSGIS22980x64872a4c
      _al_glSpriteParameterfSGIX22990x64872a14
      _al_glSpriteParameterfvSGIX23000x64872a10
      _al_glSpriteParameteriSGIX23010x64872a0c
      _al_glSpriteParameterivSGIX23020x64872a08
      _al_glStartInstrumentsSGIX23030x648729e4
      _al_glStencilClearTagEXT23040x64871f54
      _al_glStencilFuncSeparate23050x64873270
      _al_glStencilOpSeparate23060x64873274
      _al_glStopInstrumentsSGIX23070x648729e0
      _al_glStringMarkerGREMEDY23080x64871f58
      _al_glSwizzleEXT23090x64872470
      _al_glTagSampleBufferSGIX23100x648729d8
      _al_glTangent3bEXT23110x64872860
      _al_glTangent3bvEXT23120x6487285c
      _al_glTangent3dEXT23130x64872858
      _al_glTangent3dvEXT23140x64872854
      _al_glTangent3fEXT23150x64872850
      _al_glTangent3fvEXT23160x6487284c
      _al_glTangent3iEXT23170x64872848
      _al_glTangent3ivEXT23180x64872844
      _al_glTangent3sEXT23190x64872840
      _al_glTangent3svEXT23200x6487283c
      _al_glTangentPointerEXT23210x64872810
      _al_glTbufferMask3DFX23220x6487266c
      _al_glTessellationFactorAMD23230x64871a78
      _al_glTessellationModeAMD23240x64871a74
      _al_glTestFenceAPPLE23250x648722d8
      _al_glTestFenceNV23260x6487264c
      _al_glTestObjectAPPLE23270x648722d0
      _al_glTexBuffer23280x64873164
      _al_glTexBufferARB23290x64872da8
      _al_glTexBufferEXT23300x64871e6c
      _al_glTexBumpParameterfvATI23310x6487250c
      _al_glTexBumpParameterivATI23320x64872510
      _al_glTexCoord1bOES23330x6487219c
      _al_glTexCoord1bvOES23340x6487218c
      _al_glTexCoord1hNV23350x64872260
      _al_glTexCoord1hvNV23360x6487225c
      _al_glTexCoord1xOES23370x6487213c
      _al_glTexCoord1xvOES23380x6487212c
      _al_glTexCoord2bOES23390x64872198
      _al_glTexCoord2bvOES23400x64872188
      _al_glTexCoord2fColor3fVertex3fSUN23410x64872788
      _al_glTexCoord2fColor3fVertex3fvSUN23420x64872784
      _al_glTexCoord2fColor4fNormal3fVertex3fSUN23430x64872778
      _al_glTexCoord2fColor4fNormal3fVertex3fvSUN23440x64872774
      _al_glTexCoord2fColor4ubVertex3fSUN23450x64872790
      _al_glTexCoord2fColor4ubVertex3fvSUN23460x6487278c
      _al_glTexCoord2fNormal3fVertex3fSUN23470x64872780
      _al_glTexCoord2fNormal3fVertex3fvSUN23480x6487277c
      _al_glTexCoord2fVertex3fSUN23490x648727a0
      _al_glTexCoord2fVertex3fvSUN23500x6487279c
      _al_glTexCoord2hNV23510x64872258
      _al_glTexCoord2hvNV23520x64872254
      _al_glTexCoord2xOES23530x64872138
      _al_glTexCoord2xvOES23540x64872128
      _al_glTexCoord3bOES23550x64872194
      _al_glTexCoord3bvOES23560x64872184
      _al_glTexCoord3hNV23570x64872250
      _al_glTexCoord3hvNV23580x6487224c
      _al_glTexCoord3xOES23590x64872134
      _al_glTexCoord3xvOES23600x64872124
      _al_glTexCoord4bOES23610x64872190
      _al_glTexCoord4bvOES23620x64872180
      _al_glTexCoord4fColor4fNormal3fVertex4fSUN23630x64872770
      _al_glTexCoord4fColor4fNormal3fVertex4fvSUN23640x6487276c
      _al_glTexCoord4fVertex4fSUN23650x64872798
      _al_glTexCoord4fVertex4fvSUN23660x64872794
      _al_glTexCoord4hNV23670x64872248
      _al_glTexCoord4hvNV23680x64872244
      _al_glTexCoord4xOES23690x64872130
      _al_glTexCoord4xvOES23700x64872120
      _al_glTexCoordFormatNV23710x648719a4
      _al_glTexCoordP1ui23720x64872ca4
      _al_glTexCoordP1uiv23730x64872ca0
      _al_glTexCoordP2ui23740x64872c9c
      _al_glTexCoordP2uiv23750x64872c98
      _al_glTexCoordP3ui23760x64872c94
      _al_glTexCoordP3uiv23770x64872c90
      _al_glTexCoordP4ui23780x64872c8c
      _al_glTexCoordP4uiv23790x64872c88
      _al_glTexCoordPointerEXT23800x64872a20
      _al_glTexCoordPointervINTEL23810x648728d8
      _al_glTexEnvxOES23820x64872020
      _al_glTexEnvxvOES23830x6487201c
      _al_glTexFilterFuncSGIS23840x64872b28
      _al_glTexGenxOES23850x648720b4
      _al_glTexGenxvOES23860x648720b0
      _al_glTexImage2DMultisample23870x64872d44
      _al_glTexImage3D23880x64873604
      _al_glTexImage3DEXT23890x64872b34
      _al_glTexImage3DMultisample23900x64872d40
      _al_glTexImage4DSGIS23910x64872a74
      _al_glTexParameterIiv23920x64873190
      _al_glTexParameterIuiv23930x6487318c
      _al_glTexParameterxOES23940x64872034
      _al_glTexParameterxvOES23950x64872030
      _al_glTexRenderbufferNV23960x64871ac4
      _al_glTexSubImage1DEXT23970x64872b24
      _al_glTexSubImage2DEXT23980x64872b20
      _al_glTexSubImage3D23990x64873600
      _al_glTexSubImage3DEXT24000x64872b30
      _al_glTexSubImage4DSGIS24010x64872a70
      _al_glTextureBarrierNV24020x64871988
      _al_glTextureBufferEXT24030x64871b28
      _al_glTextureColorMaskSGIS24040x64872660
      _al_glTextureImage1DEXT24050x64871d50
      _al_glTextureImage2DEXT24060x64871d4c
      _al_glTextureImage3DEXT24070x64871d1c
      _al_glTextureLightEXT24080x64872904
      _al_glTextureMaterialEXT24090x64872900
      _al_glTextureNormalEXT24100x64872880
      _al_glTextureParameterIivEXT24110x64871be8
      _al_glTextureParameterIuivEXT24120x64871be4
      _al_glTextureParameterfEXT24130x64871d60
      _al_glTextureParameterfvEXT24140x64871d5c
      _al_glTextureParameteriEXT24150x64871d58
      _al_glTextureParameterivEXT24160x64871d54
      _al_glTextureRangeAPPLE24170x64871a5c
      _al_glTextureRenderbufferEXT24180x64871ad4
      _al_glTextureSubImage1DEXT24190x64871d48
      _al_glTextureSubImage2DEXT24200x64871d44
      _al_glTextureSubImage3DEXT24210x64871d18
      _al_glTrackMatrixNV24220x648725b4
      _al_glTransformFeedbackAttribsNV24230x64871dfc
      _al_glTransformFeedbackVaryings24240x6487322c
      _al_glTransformFeedbackVaryingsEXT24250x64871dbc
      _al_glTransformFeedbackVaryingsNV24260x64871df8
      _al_glTranslatexOES24270x648720c0
      _al_glUniform1d24280x64872c1c
      _al_glUniform1dv24290x64872c0c
      _al_glUniform1f24300x648733ac
      _al_glUniform1fARB24310x64872ea0
      _al_glUniform1fv24320x6487338c
      _al_glUniform1fvARB24330x64872e80
      _al_glUniform1i24340x6487339c
      _al_glUniform1iARB24350x64872e90
      _al_glUniform1iv24360x6487337c
      _al_glUniform1ivARB24370x64872e70
      _al_glUniform1ui24380x648731b0
      _al_glUniform1uiEXT24390x64871e9c
      _al_glUniform1uiv24400x648731a0
      _al_glUniform1uivEXT24410x64871e8c
      _al_glUniform2d24420x64872c18
      _al_glUniform2dv24430x64872c08
      _al_glUniform2f24440x648733a8
      _al_glUniform2fARB24450x64872e9c
      _al_glUniform2fv24460x64873388
      _al_glUniform2fvARB24470x64872e7c
      _al_glUniform2i24480x64873398
      _al_glUniform2iARB24490x64872e8c
      _al_glUniform2iv24500x64873378
      _al_glUniform2ivARB24510x64872e6c
      _al_glUniform2ui24520x648731ac
      _al_glUniform2uiEXT24530x64871e98
      _al_glUniform2uiv24540x6487319c
      _al_glUniform2uivEXT24550x64871e88
      _al_glUniform3d24560x64872c14
      _al_glUniform3dv24570x64872c04
      _al_glUniform3f24580x648733a4
      _al_glUniform3fARB24590x64872e98
      _al_glUniform3fv24600x64873384
      _al_glUniform3fvARB24610x64872e78
      _al_glUniform3i24620x64873394
      _al_glUniform3iARB24630x64872e88
      _al_glUniform3iv24640x64873374
      _al_glUniform3ivARB24650x64872e68
      _al_glUniform3ui24660x648731a8
      _al_glUniform3uiEXT24670x64871e94
      _al_glUniform3uiv24680x64873198
      _al_glUniform3uivEXT24690x64871e84
      _al_glUniform4d24700x64872c10
      _al_glUniform4dv24710x64872c00
      _al_glUniform4f24720x648733a0
      _al_glUniform4fARB24730x64872e94
      _al_glUniform4fv24740x64873380
      _al_glUniform4fvARB24750x64872e74
      _al_glUniform4i24760x64873390
      _al_glUniform4iARB24770x64872e84
      _al_glUniform4iv24780x64873370
      _al_glUniform4ivARB24790x64872e64
      _al_glUniform4ui24800x648731a4
      _al_glUniform4uiEXT24810x64871e90
      _al_glUniform4uiv24820x64873194
      _al_glUniform4uivEXT24830x64871e80
      _al_glUniformBlockBinding24840x64872d7c
      _al_glUniformBufferEXT24850x64871f30
      _al_glUniformMatrix2dv24860x64872bfc
      _al_glUniformMatrix2fv24870x6487336c
      _al_glUniformMatrix2fvARB24880x64872e60
      _al_glUniformMatrix2x3dv24890x64872bf0
      _al_glUniformMatrix2x3fv24900x6487326c
      _al_glUniformMatrix2x4dv24910x64872bec
      _al_glUniformMatrix2x4fv24920x64873264
      _al_glUniformMatrix3dv24930x64872bf8
      _al_glUniformMatrix3fv24940x64873368
      _al_glUniformMatrix3fvARB24950x64872e5c
      _al_glUniformMatrix3x2dv24960x64872be8
      _al_glUniformMatrix3x2fv24970x64873268
      _al_glUniformMatrix3x4dv24980x64872be4
      _al_glUniformMatrix3x4fv24990x6487325c
      _al_glUniformMatrix4dv25000x64872bf4
      _al_glUniformMatrix4fv25010x64873364
      _al_glUniformMatrix4fvARB25020x64872e58
      _al_glUniformMatrix4x2dv25030x64872be0
      _al_glUniformMatrix4x2fv25040x64873260
      _al_glUniformMatrix4x3dv25050x64872bdc
      _al_glUniformMatrix4x3fv25060x64873258
      _al_glUniformSubroutinesuiv25070x64872b7c
      _al_glUniformui64NV25080x648719cc
      _al_glUniformui64vNV25090x648719c8
      _al_glUnlockArraysEXT25100x64872960
      _al_glUnmapBuffer25110x64873410
      _al_glUnmapBufferARB25120x64872ef8
      _al_glUnmapNamedBufferEXT25130x64871b38
      _al_glUnmapObjectBufferATI25140x648721c4
      _al_glUpdateObjectBufferATI25150x648724b8
      _al_glUseProgram25160x648733b4
      _al_glUseProgramObjectARB25170x64872ea8
      _al_glUseShaderProgramEXT25180x648719fc
      _al_glValidateProgram25190x648733b0
      _al_glValidateProgramARB25200x64872ea4
      _al_glVariantArrayObjectATI25210x6487249c
      _al_glVariantPointerEXT25220x64872434
      _al_glVariantbvEXT25230x64872454
      _al_glVariantdvEXT25240x64872444
      _al_glVariantfvEXT25250x64872448
      _al_glVariantivEXT25260x6487244c
      _al_glVariantsvEXT25270x64872450
      _al_glVariantubvEXT25280x64872440
      _al_glVariantuivEXT25290x64872438
      _al_glVariantusvEXT25300x6487243c
      _al_glVertex2bOES25310x648721b4
      _al_glVertex2bvOES25320x648721a8
      _al_glVertex2hNV25330x64872290
      _al_glVertex2hvNV25340x6487228c
      _al_glVertex2xOES25350x6487215c
      _al_glVertex2xvOES25360x64872150
      _al_glVertex3bOES25370x648721b0
      _al_glVertex3bvOES25380x648721a4
      _al_glVertex3hNV25390x64872288
      _al_glVertex3hvNV25400x64872284
      _al_glVertex3xOES25410x64872158
      _al_glVertex3xvOES25420x6487214c
      _al_glVertex4bOES25430x648721ac
      _al_glVertex4bvOES25440x648721a0
      _al_glVertex4hNV25450x64872280
      _al_glVertex4hvNV25460x6487227c
      _al_glVertex4xOES25470x64872154
      _al_glVertex4xvOES25480x64872148
      _al_glVertexArrayParameteriAPPLE25490x648722b0
      _al_glVertexArrayRangeAPPLE25500x648722b8
      _al_glVertexArrayRangeNV25510x64872710
      _al_glVertexAttrib1d25520x64873328
      _al_glVertexAttrib1dARB25530x64873010
      _al_glVertexAttrib1dNV25540x648725ac
      _al_glVertexAttrib1dv25550x648732f4
      _al_glVertexAttrib1dvARB25560x6487300c
      _al_glVertexAttrib1dvNV25570x648725a8
      _al_glVertexAttrib1f25580x64873330
      _al_glVertexAttrib1fARB25590x64873008
      _al_glVertexAttrib1fNV25600x648725a4
      _al_glVertexAttrib1fv25610x648732fc
      _al_glVertexAttrib1fvARB25620x64873004
      _al_glVertexAttrib1fvNV25630x648725a0
      _al_glVertexAttrib1hNV25640x64872208
      _al_glVertexAttrib1hvNV25650x64872204
      _al_glVertexAttrib1s25660x6487332c
      _al_glVertexAttrib1sARB25670x64873000
      _al_glVertexAttrib1sNV25680x6487259c
      _al_glVertexAttrib1sv25690x648732f8
      _al_glVertexAttrib1svARB25700x64872ffc
      _al_glVertexAttrib1svNV25710x64872598
      _al_glVertexAttrib2d25720x6487331c
      _al_glVertexAttrib2dARB25730x64872ff8
      _al_glVertexAttrib2dNV25740x64872594
      _al_glVertexAttrib2dv25750x648732e8
      _al_glVertexAttrib2dvARB25760x64872ff4
      _al_glVertexAttrib2dvNV25770x64872590
      _al_glVertexAttrib2f25780x64873324
      _al_glVertexAttrib2fARB25790x64872ff0
      _al_glVertexAttrib2fNV25800x6487258c
      _al_glVertexAttrib2fv25810x648732f0
      _al_glVertexAttrib2fvARB25820x64872fec
      _al_glVertexAttrib2fvNV25830x64872588
      _al_glVertexAttrib2hNV25840x64872200
      _al_glVertexAttrib2hvNV25850x648721fc
      _al_glVertexAttrib2s25860x64873320
      _al_glVertexAttrib2sARB25870x64872fe8
      _al_glVertexAttrib2sNV25880x64872584
      _al_glVertexAttrib2sv25890x648732ec
      _al_glVertexAttrib2svARB25900x64872fe4
      _al_glVertexAttrib2svNV25910x64872580
      _al_glVertexAttrib3d25920x64873310
      _al_glVertexAttrib3dARB25930x64872fe0
      _al_glVertexAttrib3dNV25940x6487257c
      _al_glVertexAttrib3dv25950x648732dc
      _al_glVertexAttrib3dvARB25960x64872fdc
      _al_glVertexAttrib3dvNV25970x64872578
      _al_glVertexAttrib3f25980x64873318
      _al_glVertexAttrib3fARB25990x64872fd8
      _al_glVertexAttrib3fNV26000x64872574
      _al_glVertexAttrib3fv26010x648732e4
      _al_glVertexAttrib3fvARB26020x64872fd4
      _al_glVertexAttrib3fvNV26030x64872570
      _al_glVertexAttrib3hNV26040x648721f8
      _al_glVertexAttrib3hvNV26050x648721f4
      _al_glVertexAttrib3s26060x64873314
      _al_glVertexAttrib3sARB26070x64872fd0
      _al_glVertexAttrib3sNV26080x6487256c
      _al_glVertexAttrib3sv26090x648732e0
      _al_glVertexAttrib3svARB26100x64872fcc
      _al_glVertexAttrib3svNV26110x64872568
      _al_glVertexAttrib4Nbv26120x648732b8
      _al_glVertexAttrib4NbvARB26130x64872fc8
      _al_glVertexAttrib4Niv26140x648732b0
      _al_glVertexAttrib4NivARB26150x64872fc4
      _al_glVertexAttrib4Nsv26160x648732b4
      _al_glVertexAttrib4NsvARB26170x64872fc0
      _al_glVertexAttrib4Nub26180x64873300
      _al_glVertexAttrib4NubARB26190x64872fbc
      _al_glVertexAttrib4Nubv26200x648732ac
      _al_glVertexAttrib4NubvARB26210x64872fb8
      _al_glVertexAttrib4Nuiv26220x648732a4
      _al_glVertexAttrib4NuivARB26230x64872fb4
      _al_glVertexAttrib4Nusv26240x648732a8
      _al_glVertexAttrib4NusvARB26250x64872fb0
      _al_glVertexAttrib4bv26260x648732c8
      _al_glVertexAttrib4bvARB26270x64872fac
      _al_glVertexAttrib4d26280x64873304
      _al_glVertexAttrib4dARB26290x64872fa8
      _al_glVertexAttrib4dNV26300x64872564
      _al_glVertexAttrib4dv26310x648732d0
      _al_glVertexAttrib4dvARB26320x64872fa4
      _al_glVertexAttrib4dvNV26330x64872560
      _al_glVertexAttrib4f26340x6487330c
      _al_glVertexAttrib4fARB26350x64872fa0
      _al_glVertexAttrib4fNV26360x6487255c
      _al_glVertexAttrib4fv26370x648732d8
      _al_glVertexAttrib4fvARB26380x64872f9c
      _al_glVertexAttrib4fvNV26390x64872558
      _al_glVertexAttrib4hNV26400x648721f0
      _al_glVertexAttrib4hvNV26410x648721ec
      _al_glVertexAttrib4iv26420x648732cc
      _al_glVertexAttrib4ivARB26430x64872f98
      _al_glVertexAttrib4s26440x64873308
      _al_glVertexAttrib4sARB26450x64872f94
      _al_glVertexAttrib4sNV26460x64872554
      _al_glVertexAttrib4sv26470x648732d4
      _al_glVertexAttrib4svARB26480x64872f90
      _al_glVertexAttrib4svNV26490x64872550
      _al_glVertexAttrib4ubNV26500x6487254c
      _al_glVertexAttrib4ubv26510x648732c4
      _al_glVertexAttrib4ubvARB26520x64872f8c
      _al_glVertexAttrib4ubvNV26530x64872548
      _al_glVertexAttrib4uiv26540x648732bc
      _al_glVertexAttrib4uivARB26550x64872f88
      _al_glVertexAttrib4usv26560x648732c0
      _al_glVertexAttrib4usvARB26570x64872f84
      _al_glVertexAttribArrayObjectATI26580x648721c0
      _al_glVertexAttribDivisor26590x64872db4
      _al_glVertexAttribFormatNV26600x64871994
      _al_glVertexAttribI1i26610x64873218
      _al_glVertexAttribI1iEXT26620x64871ef8
      _al_glVertexAttribI1iv26630x648731f8
      _al_glVertexAttribI1ivEXT26640x64871ed8
      _al_glVertexAttribI1ui26650x64873208
      _al_glVertexAttribI1uiEXT26660x64871ee8
      _al_glVertexAttribI1uiv26670x648731e8
      _al_glVertexAttribI1uivEXT26680x64871ec8
      _al_glVertexAttribI2i26690x64873214
      _al_glVertexAttribI2iEXT26700x64871ef4
      _al_glVertexAttribI2iv26710x648731f4
      _al_glVertexAttribI2ivEXT26720x64871ed4
      _al_glVertexAttribI2ui26730x64873204
      _al_glVertexAttribI2uiEXT26740x64871ee4
      _al_glVertexAttribI2uiv26750x648731e4
      _al_glVertexAttribI2uivEXT26760x64871ec4
      _al_glVertexAttribI3i26770x64873210
      _al_glVertexAttribI3iEXT26780x64871ef0
      _al_glVertexAttribI3iv26790x648731f0
      _al_glVertexAttribI3ivEXT26800x64871ed0
      _al_glVertexAttribI3ui26810x64873200
      _al_glVertexAttribI3uiEXT26820x64871ee0
      _al_glVertexAttribI3uiv26830x648731e0
      _al_glVertexAttribI3uivEXT26840x64871ec0
      _al_glVertexAttribI4bv26850x648731d8
      _al_glVertexAttribI4bvEXT26860x64871eb8
      _al_glVertexAttribI4i26870x6487320c
      _al_glVertexAttribI4iEXT26880x64871eec
      _al_glVertexAttribI4iv26890x648731ec
      _al_glVertexAttribI4ivEXT26900x64871ecc
      _al_glVertexAttribI4sv26910x648731d4
      _al_glVertexAttribI4svEXT26920x64871eb4
      _al_glVertexAttribI4ubv26930x648731d0
      _al_glVertexAttribI4ubvEXT26940x64871eb0
      _al_glVertexAttribI4ui26950x648731fc
      _al_glVertexAttribI4uiEXT26960x64871edc
      _al_glVertexAttribI4uiv26970x648731dc
      _al_glVertexAttribI4uivEXT26980x64871ebc
      _al_glVertexAttribI4usv26990x648731cc
      _al_glVertexAttribI4usvEXT27000x64871eac
      _al_glVertexAttribIFormatNV27010x64871990
      _al_glVertexAttribIPointer27020x648731c8
      _al_glVertexAttribIPointerEXT27030x64871ea8
      _al_glVertexAttribP1ui27040x64872c44
      _al_glVertexAttribP1uiv27050x64872c40
      _al_glVertexAttribP2ui27060x64872c3c
      _al_glVertexAttribP2uiv27070x64872c38
      _al_glVertexAttribP3ui27080x64872c34
      _al_glVertexAttribP3uiv27090x64872c30
      _al_glVertexAttribP4ui27100x64872c2c
      _al_glVertexAttribP4uiv27110x64872c28
      _al_glVertexAttribPointer27120x648732a0
      _al_glVertexAttribPointerARB27130x64872f80
      _al_glVertexAttribPointerNV27140x648725b0
      _al_glVertexAttribs1dvNV27150x64872544
      _al_glVertexAttribs1fvNV27160x64872540
      _al_glVertexAttribs1hvNV27170x648721e8
      _al_glVertexAttribs1svNV27180x6487253c
      _al_glVertexAttribs2dvNV27190x64872538
      _al_glVertexAttribs2fvNV27200x64872534
      _al_glVertexAttribs2hvNV27210x648721e4
      _al_glVertexAttribs2svNV27220x64872530
      _al_glVertexAttribs3dvNV27230x6487252c
      _al_glVertexAttribs3fvNV27240x64872528
      _al_glVertexAttribs3hvNV27250x648721e0
      _al_glVertexAttribs3svNV27260x64872524
      _al_glVertexAttribs4dvNV27270x64872520
      _al_glVertexAttribs4fvNV27280x6487251c
      _al_glVertexAttribs4hvNV27290x648721dc
      _al_glVertexAttribs4svNV27300x64872518
      _al_glVertexAttribs4ubvNV27310x64872514
      _al_glVertexBlendARB27320x64873068
      _al_glVertexBlendEnvfATI27330x64872338
      _al_glVertexBlendEnviATI27340x6487233c
      _al_glVertexFormatNV27350x648719b4
      _al_glVertexP2ui27360x64872cbc
      _al_glVertexP2uiv27370x64872cb8
      _al_glVertexP3ui27380x64872cb4
      _al_glVertexP3uiv27390x64872cb0
      _al_glVertexP4ui27400x64872cac
      _al_glVertexP4uiv27410x64872ca8
      _al_glVertexPointerEXT27420x64872a1c
      _al_glVertexPointervINTEL27430x648728e4
      _al_glVertexStream1dATI27440x648723d0
      _al_glVertexStream1dvATI27450x648723cc
      _al_glVertexStream1fATI27460x648723d8
      _al_glVertexStream1fvATI27470x648723d4
      _al_glVertexStream1iATI27480x648723e0
      _al_glVertexStream1ivATI27490x648723dc
      _al_glVertexStream1sATI27500x648723e8
      _al_glVertexStream1svATI27510x648723e4
      _al_glVertexStream2dATI27520x648723b0
      _al_glVertexStream2dvATI27530x648723ac
      _al_glVertexStream2fATI27540x648723b8
      _al_glVertexStream2fvATI27550x648723b4
      _al_glVertexStream2iATI27560x648723c0
      _al_glVertexStream2ivATI27570x648723bc
      _al_glVertexStream2sATI27580x648723c8
      _al_glVertexStream2svATI27590x648723c4
      _al_glVertexStream3dATI27600x64872390
      _al_glVertexStream3dvATI27610x6487238c
      _al_glVertexStream3fATI27620x64872398
      _al_glVertexStream3fvATI27630x64872394
      _al_glVertexStream3iATI27640x648723a0
      _al_glVertexStream3ivATI27650x6487239c
      _al_glVertexStream3sATI27660x648723a8
      _al_glVertexStream3svATI27670x648723a4
      _al_glVertexStream4dATI27680x64872370
      _al_glVertexStream4dvATI27690x6487236c
      _al_glVertexStream4fATI27700x64872378
      _al_glVertexStream4fvATI27710x64872374
      _al_glVertexStream4iATI27720x64872380
      _al_glVertexStream4ivATI27730x6487237c
      _al_glVertexStream4sATI27740x64872388
      _al_glVertexStream4svATI27750x64872384
      _al_glVertexWeightPointerEXT27760x64872718
      _al_glVertexWeightfEXT27770x64872720
      _al_glVertexWeightfvEXT27780x6487271c
      _al_glVertexWeighthNV27790x64872210
      _al_glVertexWeighthvNV27800x6487220c
      _al_glVideoCaptureNV27810x64871a0c
      _al_glVideoCaptureStreamParameterdvNV27820x64871a00
      _al_glVideoCaptureStreamParameterfvNV27830x64871a04
      _al_glVideoCaptureStreamParameterivNV27840x64871a08
      _al_glWaitSync27850x64872d50
      _al_glWeightPointerARB27860x6487306c
      _al_glWeightbvARB27870x6487308c
      _al_glWeightdvARB27880x6487307c
      _al_glWeightfvARB27890x64873080
      _al_glWeightivARB27900x64873084
      _al_glWeightsvARB27910x64873088
      _al_glWeightubvARB27920x64873078
      _al_glWeightuivARB27930x64873070
      _al_glWeightusvARB27940x64873074
      _al_glWindowPos2d27950x64873470
      _al_glWindowPos2dARB27960x64873050
      _al_glWindowPos2dMESA27970x648726d4
      _al_glWindowPos2dv27980x6487346c
      _al_glWindowPos2dvARB27990x6487304c
      _al_glWindowPos2dvMESA28000x648726d0
      _al_glWindowPos2f28010x64873468
      _al_glWindowPos2fARB28020x64873048
      _al_glWindowPos2fMESA28030x648726cc
      _al_glWindowPos2fv28040x64873464
      _al_glWindowPos2fvARB28050x64873044
      _al_glWindowPos2fvMESA28060x648726c8
      _al_glWindowPos2i28070x64873460
      _al_glWindowPos2iARB28080x64873040
      _al_glWindowPos2iMESA28090x648726c4
      _al_glWindowPos2iv28100x6487345c
      _al_glWindowPos2ivARB28110x6487303c
      _al_glWindowPos2ivMESA28120x648726c0
      _al_glWindowPos2s28130x64873458
      _al_glWindowPos2sARB28140x64873038
      _al_glWindowPos2sMESA28150x648726bc
      _al_glWindowPos2sv28160x64873454
      _al_glWindowPos2svARB28170x64873034
      _al_glWindowPos2svMESA28180x648726b8
      _al_glWindowPos3d28190x64873450
      _al_glWindowPos3dARB28200x64873030
      _al_glWindowPos3dMESA28210x648726b4
      _al_glWindowPos3dv28220x6487344c
      _al_glWindowPos3dvARB28230x6487302c
      _al_glWindowPos3dvMESA28240x648726b0
      _al_glWindowPos3f28250x64873448
      _al_glWindowPos3fARB28260x64873028
      _al_glWindowPos3fMESA28270x648726ac
      _al_glWindowPos3fv28280x64873444
      _al_glWindowPos3fvARB28290x64873024
      _al_glWindowPos3fvMESA28300x648726a8
      _al_glWindowPos3i28310x64873440
      _al_glWindowPos3iARB28320x64873020
      _al_glWindowPos3iMESA28330x648726a4
      _al_glWindowPos3iv28340x6487343c
      _al_glWindowPos3ivARB28350x6487301c
      _al_glWindowPos3ivMESA28360x648726a0
      _al_glWindowPos3s28370x64873438
      _al_glWindowPos3sARB28380x64873018
      _al_glWindowPos3sMESA28390x6487269c
      _al_glWindowPos3sv28400x64873434
      _al_glWindowPos3svARB28410x64873014
      _al_glWindowPos3svMESA28420x64872698
      _al_glWindowPos4dMESA28430x64872694
      _al_glWindowPos4dvMESA28440x64872690
      _al_glWindowPos4fMESA28450x6487268c
      _al_glWindowPos4fvMESA28460x64872688
      _al_glWindowPos4iMESA28470x64872684
      _al_glWindowPos4ivMESA28480x64872680
      _al_glWindowPos4sMESA28490x6487267c
      _al_glWindowPos4svMESA28500x64872678
      _al_glWriteMaskEXT28510x6487246c
      _al_import_symbol28520x64623d8c
      _al_init_d3d_driver28530x645de3f0
      _al_init_destructors28540x645fe274
      _al_init_events28550x645fe838
      _al_init_gdiplus28560x645d20d0
      _al_init_iio_table28570x645e3a0c
      _al_init_native_dialog_addon28580x645d4b38
      _al_init_pixels28590x6462332c
      _al_init_timers28600x646245c0
      _al_joydrv_directx28610x647dd260
      _al_joystick_driver_list28620x647dd200
      _al_kcm_destroy_sample28630x645c6438
      _al_kcm_detach_from_parent28640x645c61a0
      _al_kcm_driver28650x648710e0
      _al_kcm_dsound_driver28660x647da020
      _al_kcm_emit_stream_events28670x645cbb58
      _al_kcm_feed_stream28680x645cb7a0
      _al_kcm_foreach_destructor28690x645c5eac
      _al_kcm_get_silence28700x645c47e8
      _al_kcm_init_destructors28710x645c5e1c
      _al_kcm_mixer_read28720x645c93d0
      _al_kcm_mixer_rejig_sample_matrix28730x645c9968
      _al_kcm_openal_driver28740x647da080
      _al_kcm_refill_stream28750x645cb688
      _al_kcm_register_destructor28760x645c5e6c
      _al_kcm_set_voice_playing28770x645cc6cc
      _al_kcm_shutdown_default_mixer28780x645cac6c
      _al_kcm_shutdown_destructors28790x645c5e3c
      _al_kcm_stream_set_mutex28800x645c6134
      _al_kcm_unregister_destructor28810x645c5e90
      _al_key_led_flag28820x647dbb4c
      _al_keyboard_common_names28830x647db7c0
      _al_keyboard_driver_list28840x647dd2a0
      _al_line_2d28850x645dc920
      _al_list_at28860x6460ae34
      _al_list_back28870x6460ae9c
      _al_list_clear28880x6460abf8
      _al_list_contains28890x6460ad5c
      _al_list_create28900x6460a4c4
      _al_list_create_static28910x6460a548
      _al_list_destroy28920x6460a5fc
      _al_list_erase28930x6460ab80
      _al_list_find_after28940x6460add4
      _al_list_find_before28950x6460ae00
      _al_list_find_first28960x6460ad84
      _al_list_find_last28970x6460adac
      _al_list_front28980x6460ae84
      _al_list_get_dtor28990x6460a6d8
      _al_list_get_user_data29000x6460af3c
      _al_list_insert_after29010x6460a9b0
      _al_list_insert_after_ex29020x6460aa24
      _al_list_insert_before29030x6460aa98
      _al_list_insert_before_ex29040x6460ab0c
      _al_list_is_empty29050x6460ad4c
      _al_list_item_data29060x6460af14
      _al_list_item_get_dtor29070x6460af28
      _al_list_item_set_dtor29080x6460af1c
      _al_list_next29090x6460aeb4
      _al_list_next_circular29100x6460aedc
      _al_list_pop_back29110x6460a928
      _al_list_pop_front29120x6460a8a0
      _al_list_previous29130x6460aec8
      _al_list_previous_circular29140x6460aef8
      _al_list_push_back29150x6460a7c0
      _al_list_push_back_ex29160x6460a830
      _al_list_push_front29170x6460a6e0
      _al_list_push_front_ex29180x6460a750
      _al_list_remove29190x6460ac90
      _al_list_set_dtor29200x6460a6cc
      _al_list_set_user_data29210x6460af30
      _al_list_size29220x6460ae2c
      _al_load_bitmap_font29230x645cf064
      _al_load_bmp29240x645d1674
      _al_load_bmp_f29250x645d00c0
      _al_load_flac29260x645c1f3c
      _al_load_flac_audio_stream29270x645c20d8
      _al_load_flac_audio_stream_f29280x645c1f7c
      _al_load_flac_f29290x645c1de4
      _al_load_gdiplus_bitmap29300x645d1bec
      _al_load_gdiplus_bitmap_f29310x645d1840
      _al_load_it_audio_stream29320x645c2808
      _al_load_it_audio_stream_f29330x645c2d9c
      _al_load_mod_audio_stream29340x645c2698
      _al_load_mod_audio_stream_f29350x645c2c58
      _al_load_ogg_vorbis29360x645c3688
      _al_load_ogg_vorbis_audio_stream29370x645c3904
      _al_load_ogg_vorbis_audio_stream_f29380x645c36c8
      _al_load_ogg_vorbis_f29390x645c348c
      _al_load_pcx29400x645d2ca0
      _al_load_pcx_f29410x645d23c8
      _al_load_s3m_audio_stream29420x645c2ae8
      _al_load_s3m_audio_stream_f29430x645c3024
      _al_load_tga29440x645d3d90
      _al_load_tga_f29450x645d2d2c
      _al_load_wav29460x645c4074
      _al_load_wav_audio_stream29470x645c41e0
      _al_load_wav_audio_stream_f29480x645c40b4
      _al_load_wav_f29490x645c3f24
      _al_load_xm_audio_stream29500x645c2978
      _al_load_xm_audio_stream_f29510x645c2ee0
      _al_mouse_driver_list29520x647dd300
      _al_mutex_destroy29530x6466c4fc
      _al_mutex_init29540x6466c464
      _al_mutex_init_recursive29550x6466c4b0
      _al_mutex_lock29560x64601da4
      _al_mutex_unlock29570x64601dc0
      _al_ogl_add_drawing_functions29580x64622700
      _al_ogl_create_backbuffer29590x64621f00
      _al_ogl_create_bitmap29600x646211d8
      _al_ogl_create_persistent_fbo29610x646215ac
      _al_ogl_create_sub_bitmap29620x64621368
      _al_ogl_destroy_backbuffer29630x646220ec
      _al_ogl_get_backbuffer29640x64621e94
      _al_ogl_look_for_an_extension29650x646118d4
      _al_ogl_manage_extensions29660x646119c0
      _al_ogl_persist_fbo29670x64621770
      _al_ogl_reset_fbo_info29680x6462158c
      _al_ogl_resize_backbuffer29690x64621ea4
      _al_ogl_set_extensions29700x6460bdf0
      _al_ogl_set_target_bitmap29710x64621954
      _al_ogl_setup_bitmap_clipping29720x6462187c
      _al_ogl_setup_gl29730x64621fc0
      _al_ogl_unmanage_extensions29740x6461ffa0
      _al_open_library29750x64623d78
      _al_open_native_text_log29760x645d52f0
      _al_opengl_set_blender29770x64622480
      _al_parse_key_binding29780x64602158
      _al_pixel_format_has_alpha29790x64623498
      _al_pixel_format_is_real29800x646234a4
      _al_pixel_format_name29810x64623628
      _al_pixel_format_to_d3d29820x6465eda8
      _al_point_2d29830x645dcc48
      _al_pop_destructor_owner29840x645fe2d8
      _al_push_destructor_owner29850x645fe2c8
      _al_put_pixel29860x645e4e00
      _al_rand29870x64602438
      _al_register_destructor29880x645fe3a4
      _al_register_system_interfaces29890x64669250
      _al_remove_exit_func29900x645ff394
      _al_rgb_scale_129910x648789e0
      _al_rgb_scale_429920x648789a0
      _al_rgb_scale_529930x64878920
      _al_rgb_scale_629940x64878a00
      _al_run_destructors29950x645fe2e8
      _al_run_exit_funcs29960x645ff3f8
      _al_sane_realloc29970x64602338
      _al_sane_strncpy29980x646023fc
      _al_save_bmp29990x645d16b4
      _al_save_bmp_f30000x645d1444
      _al_save_gdiplus_bitmap30010x645d1fc8
      _al_save_gdiplus_gif_f30020x645d20ac
      _al_save_gdiplus_jpg_f30030x645d2064
      _al_save_gdiplus_png_f30040x645d2040
      _al_save_gdiplus_tif_f30050x645d2088
      _al_save_pcx30060x645d2ce0
      _al_save_pcx_f30070x645d2864
      _al_save_tga30080x645d3dd0
      _al_save_tga_f30090x645d3b8c
      _al_save_wav30100x645c458c
      _al_save_wav_f30110x645c4238
      _al_score_display_settings30120x645fbbb4
      _al_set_color_components30130x645fc528
      _al_set_current_display_only30140x64625124
      _al_set_d3d_decl30150x645de56c
      _al_set_display_invalidated_callback30160x645fb79c
      _al_set_error30170x645c478c
      _al_set_new_display_settings30180x64624940
      _al_set_physfs_fs_interface30190x645d6018
      _al_set_texture_matrix30200x645d6940
      _al_setup_default_shader30210x645d69dc
      _al_setup_shader30220x645d69ac
      _al_show_native_file_dialog30230x645d4b40
      _al_show_native_message_box30240x645d50a4
      _al_shutdown_d3d_driver30250x645de404
      _al_shutdown_destructors30260x645fe360
      _al_shutdown_gdiplus30270x645d1818
      _al_shutdown_logging30280x645fb184
      _al_shutdown_native_dialog_addon30290x645d4b3c
      _al_srand30300x6460242c
      _al_stricmp30310x646022f8
      _al_system_interfaces30320x64878b00
      _al_thread_create30330x6466c364
      _al_thread_detach30340x6466c440
      _al_thread_join30350x6466c3ec
      _al_thread_set_should_stop30360x6466c3c4
      _al_three_finger_flag30370x647dbb4d
      _al_tls_get_dtor_owner_count30380x64626818
      _al_tls_init_once30390x6462493c
      _al_trace_prefix30400x645fab60
      _al_trace_suffix30410x645fb124
      _al_transform_is_translation30420x64626cc8
      _al_triangle_2d30430x646581c0
      _al_u8_to_float30440x64878520
      _al_unregister_destructor30450x645fe3fc
      _al_user_assert_handler30460x64878504
      _al_vector_alloc_back30470x6460b034
      _al_vector_alloc_mid30480x6460b0d8
      _al_vector_append_array30490x6460af8c
      _al_vector_contains30500x6460b238
      _al_vector_delete_at30510x6460b2b8
      _al_vector_find30520x6460b1bc
      _al_vector_find_and_delete30530x6460b318
      _al_vector_free30540x6460b42c
      _al_vector_init30550x6460af44
      _al_vector_is_empty30560x64601de4
      _al_vector_is_nonempty30570x64601df4
      _al_vector_ref30580x6460af64
      _al_vector_ref_back30590x6460af7c
      _al_vector_ref_front30600x6460af74
      _al_vector_size30610x64601ddc
      _al_voice_update30620x645cbeb4
      _al_wglAddSwapHintRectWIN30630x6487185c
      _al_wglAllocateMemoryNV30640x648718f4
      _al_wglAssociateImageBufferEventsI3D30650x64871884
      _al_wglBeginFrameTrackingI3D30660x64871868
      _al_wglBindDisplayColorTableEXT30670x64871930
      _al_wglBindSwapBarrierNV30680x64871830
      _al_wglBindTexImageARB30690x64871948
      _al_wglBindVideoCaptureDeviceNV30700x648717e4
      _al_wglBindVideoDeviceNV30710x64871854
      _al_wglBindVideoImageNV30720x64871844
      _al_wglBlitContextFramebufferAMD30730x648717e8
      _al_wglChoosePixelFormatARB30740x64871968
      _al_wglChoosePixelFormatEXT30750x64871900
      _al_wglCopyImageSubDataNV30760x648717d0
      _al_wglCreateAffinityDCNV30770x64871814
      _al_wglCreateAssociatedContextAMD30780x648717fc
      _al_wglCreateAssociatedContextAttribsAMD30790x648717f8
      _al_wglCreateBufferRegionARB30800x64871984
      _al_wglCreateContextAttribsARB30810x6487193c
      _al_wglCreateDisplayColorTableEXT30820x64871938
      _al_wglCreateImageBufferI3D30830x6487188c
      _al_wglCreatePbufferARB30840x6487195c
      _al_wglCreatePbufferEXT30850x6487191c
      _al_wglDeleteAssociatedContextAMD30860x648717f4
      _al_wglDeleteBufferRegionARB30870x64871980
      _al_wglDeleteDCNV30880x6487180c
      _al_wglDestroyDisplayColorTableEXT30890x6487192c
      _al_wglDestroyImageBufferI3D30900x64871888
      _al_wglDestroyPbufferARB30910x64871950
      _al_wglDestroyPbufferEXT30920x64871910
      _al_wglDisableFrameLockI3D30930x64871878
      _al_wglDisableGenlockI3D30940x648718b8
      _al_wglEnableFrameLockI3D30950x6487187c
      _al_wglEnableGenlockI3D30960x648718bc
      _al_wglEndFrameTrackingI3D30970x64871864
      _al_wglEnumGpuDevicesNV30980x64871818
      _al_wglEnumGpusFromAffinityDCNV30990x64871810
      _al_wglEnumGpusNV31000x6487181c
      _al_wglEnumerateVideoCaptureDevicesNV31010x648717e0
      _al_wglEnumerateVideoDevicesNV31020x64871858
      _al_wglFreeMemoryNV31030x648718f0
      _al_wglGenlockSampleRateI3D31040x648718a0
      _al_wglGenlockSourceDelayI3D31050x64871898
      _al_wglGenlockSourceEdgeI3D31060x648718a8
      _al_wglGenlockSourceI3D31070x648718b0
      _al_wglGetContextGPUIDAMD31080x64871800
      _al_wglGetCurrentAssociatedContextAMD31090x648717ec
      _al_wglGetCurrentReadDCARB31100x64871960
      _al_wglGetCurrentReadDCEXT31110x64871920
      _al_wglGetDigitalVideoParametersI3D31120x648718d4
      _al_wglGetExtensionsStringARB31130x64871974
      _al_wglGetExtensionsStringEXT31140x64871928
      _al_wglGetFrameUsageI3D31150x6487186c
      _al_wglGetGPUIDsAMD31160x64871808
      _al_wglGetGPUInfoAMD31170x64871804
      _al_wglGetGammaTableI3D31180x648718c4
      _al_wglGetGammaTableParametersI3D31190x648718cc
      _al_wglGetGenlockSampleRateI3D31200x6487189c
      _al_wglGetGenlockSourceDelayI3D31210x64871894
      _al_wglGetGenlockSourceEdgeI3D31220x648718a4
      _al_wglGetGenlockSourceI3D31230x648718ac
      _al_wglGetMscRateOML31240x648718e8
      _al_wglGetPbufferDCARB31250x64871958
      _al_wglGetPbufferDCEXT31260x64871918
      _al_wglGetPixelFormatAttribfvARB31270x6487196c
      _al_wglGetPixelFormatAttribfvEXT31280x64871904
      _al_wglGetPixelFormatAttribivARB31290x64871970
      _al_wglGetPixelFormatAttribivEXT31300x64871908
      _al_wglGetSwapIntervalEXT31310x648718f8
      _al_wglGetSyncValuesOML31320x648718ec
      _al_wglGetVideoDeviceNV31330x6487184c
      _al_wglGetVideoInfoNV31340x64871838
      _al_wglIsEnabledFrameLockI3D31350x64871874
      _al_wglIsEnabledGenlockI3D31360x648718b4
      _al_wglJoinSwapGroupNV31370x64871834
      _al_wglLoadDisplayColorTableEXT31380x64871934
      _al_wglLockVideoCaptureDeviceNV31390x648717dc
      _al_wglMakeAssociatedContextCurrentAMD31400x648717f0
      _al_wglMakeContextCurrentARB31410x64871964
      _al_wglMakeContextCurrentEXT31420x64871924
      _al_wglQueryCurrentContextNV31430x64871850
      _al_wglQueryFrameCountNV31440x64871824
      _al_wglQueryFrameLockMasterI3D31450x64871870
      _al_wglQueryFrameTrackingI3D31460x64871860
      _al_wglQueryGenlockMaxSourceDelayI3D31470x64871890
      _al_wglQueryMaxSwapGroupsNV31480x64871828
      _al_wglQueryPbufferARB31490x6487194c
      _al_wglQueryPbufferEXT31500x6487190c
      _al_wglQuerySwapGroupNV31510x6487182c
      _al_wglQueryVideoCaptureDeviceNV31520x648717d8
      _al_wglReleaseImageBufferEventsI3D31530x64871880
      _al_wglReleasePbufferDCARB31540x64871954
      _al_wglReleasePbufferDCEXT31550x64871914
      _al_wglReleaseTexImageARB31560x64871944
      _al_wglReleaseVideoCaptureDeviceNV31570x648717d4
      _al_wglReleaseVideoDeviceNV31580x64871848
      _al_wglReleaseVideoImageNV31590x64871840
      _al_wglResetFrameCountNV31600x64871820
      _al_wglRestoreBufferRegionARB31610x64871978
      _al_wglSaveBufferRegionARB31620x6487197c
      _al_wglSendPbufferToVideoNV31630x6487183c
      _al_wglSetDigitalVideoParametersI3D31640x648718d0
      _al_wglSetGammaTableI3D31650x648718c0
      _al_wglSetGammaTableParametersI3D31660x648718c8
      _al_wglSetPbufferAttribARB31670x64871940
      _al_wglSwapBuffersMscOML31680x648718e4
      _al_wglSwapIntervalEXT31690x648718fc
      _al_wglSwapLayerBuffersMscOML31700x648718e0
      _al_wglWaitForMscOML31710x648718dc
      _al_wglWaitForSbcOML31720x648718d8
      _al_wgl_get_display_mode31730x64662e4c
      _al_wgl_get_num_display_modes31740x64662e00
      _al_win_create_faux_fullscreen_window31750x6466b6dc
      _al_win_create_hidden_window31760x6466b35c
      _al_win_create_icon31770x64666edc
      _al_win_create_mouse_cursor31780x64667864
      _al_win_create_window31790x6466b3cc
      _al_win_destroy_mouse_cursor31800x646678e8
      _al_win_determine_adapter31810x6466c1bc
      _al_win_disable_screensaver31820x64876360
      _al_win_fix_modifiers31830x64666930
      _al_win_get_path31840x64668cc0
      _al_win_get_window_position31850x6466ba40
      _al_win_grab_input31860x6466b878
      _al_win_hide_mouse_cursor31870x64667ac0
      _al_win_init_time31880x646694e0
      _al_win_init_window31890x6466b8ac
      _al_win_joystick_dinput_grab31900x6466323c
      _al_win_joystick_dinput_unacquire31910x64662f4c
      _al_win_kbd_handle_key_press31920x6466693c
      _al_win_kbd_handle_key_release31930x64666cc4
      _al_win_mouse_handle_button31940x6466861c
      _al_win_mouse_handle_enter31950x64668230
      _al_win_mouse_handle_hwheel31960x64668520
      _al_win_mouse_handle_leave31970x64668144
      _al_win_mouse_handle_move31980x64668308
      _al_win_mouse_handle_wheel31990x64668424
      _al_win_msg_call_proc32000x648763a4
      _al_win_msg_suicide32010x648763a0
      _al_win_safe_load_library32020x64669140
      _al_win_set_display_flag32030x6466bb20
      _al_win_set_display_icons32040x6466b974
      _al_win_set_mouse_cursor32050x646679c0
      _al_win_set_system_mouse_cursor32060x64667b00
      _al_win_set_window_frameless32070x6466ba80
      _al_win_set_window_position32080x6466b9f8
      _al_win_set_window_title32090x6466c124
      _al_win_show_mouse_cursor32100x64667a10
      _al_win_shutdown_time32110x64669578
      _al_win_thread_exit32120x646693b0
      _al_win_thread_init32130x64669338
      _al_win_utf1632140x64669640
      _al_win_utf832150x64669714
      _al_win_wnd_call_proc32160x6466c148
      _al_win_wnd_schedule_proc32170x6466c178
      _al_word_size_to_depth_conf32180x645c47d0
      _book_maptype1_quantvals32190x64720f60
      _book_unquantize32200x64720ff4
      _dumb_it_end_sigrenderer32210x64738cb4
      _dumb_it_fix_invalid_orders32220x64742630
      _dumb_it_unload_sigdata32230x647426f0
      _dumb_it_xm_convert_effect32240x64762498
      _dumb_sigtype_it32250x647ddac0
      _float32_pack32260x64720c20
      _float32_unpack32270x64720ce0
      _floor_P32280x648053f4
      _get_output_format32290x647d4534
      _ilog32300x64720c0c
      _make_words32310x64720d24
      _mapping_P32320x648053e4
      _residue_P32330x648053e8
      _ve_envelope_clear32340x64727790
      _ve_envelope_init32350x64727588
      _ve_envelope_mark32360x64727ae4
      _ve_envelope_search32370x64727830
      _ve_envelope_shift32380x64727bec
      _vi_gpsy_free32390x64723fc4
      _vi_psy_free32400x64723fe8
      _vorbis_apply_window32410x6472c670
      _vorbis_block_alloc32420x6471ee54
      _vorbis_block_ripcord32430x6471eec8
      _vorbis_window_get32440x6472c664
      _vp_ampmax_decay32450x64724fd0
      _vp_couple_quantize_normalize32460x64725014
      _vp_global_free32470x64723fa0
      _vp_global_look32480x64723f64
      _vp_noisemask32490x64724954
      _vp_offset_and_mix32500x64724e90
      _vp_psy_clear32510x64724814
      _vp_psy_init32520x6472400c
      _vp_tonemask32530x64724a80
      adler3232540x64765bec
      adler32_combine32550x64765f50
      adler32_combine6432560x64765fd4
      af_autofitter_service32570x64817884
      af_cjk_script_class32580x648178c0
      af_dummy_script_class32590x64817900
      af_glyph_hints_dump_edges32600x6477bd24
      af_glyph_hints_dump_points32610x6477bd14
      af_glyph_hints_dump_segments32620x6477bd18
      af_glyph_hints_get_num_segments32630x6477bd1c
      af_glyph_hints_get_segment_offset32640x6477bd20
      af_indic_script_class32650x648178a0
      af_latin_script_class32660x648178e0
      afm_parser_funcs32670x6481c534
      alAuxiliaryEffectSlotf32680x646a6704
      alAuxiliaryEffectSlotfv32690x646a67e4
      alAuxiliaryEffectSloti32700x646a633c
      alAuxiliaryEffectSlotiv32710x646a6668
      alBuffer3f32720x64697140
      alBuffer3i32730x646972c8
      alBufferData32740x64698980
      alBufferSamplesSOFT32750x646987e8
      alBufferSubDataSOFT32760x64697e30
      alBufferSubSamplesSOFT32770x64696cb4
      alBufferf32780x646970cc
      alBufferfv32790x646971b4
      alBufferi32800x64697254
      alBufferiv32810x6469733c
      alDatabufferDataEXT32820x646a789c
      alDatabufferSubDataEXT32830x646a79c4
      alDatabufferfEXT32840x646a7b60
      alDatabufferfvEXT32850x646a7bd4
      alDatabufferiEXT32860x646a7c48
      alDatabufferivEXT32870x646a7cbc
      alDeleteAuxiliaryEffectSlots32880x646a600c
      alDeleteBuffers32890x64696a0c
      alDeleteDatabuffersEXT32900x646a75d0
      alDeleteEffects32910x646a4a2c
      alDeleteFilters32920x646a6c98
      alDeleteSources32930x6468d73c
      alDisable32940x6469d2e0
      alDistanceModel32950x6469dc9c
      alDopplerFactor32960x6469db10
      alDopplerVelocity32970x6469db94
      alEffectf32980x646a4cb4
      alEffectfv32990x646a581c
      alEffecti33000x646a540c
      alEffectiv33010x646a56f4
      alEnable33020x6469d264
      alFilterf33030x646a70f4
      alFilterfv33040x646a71f8
      alFilteri33050x646a6f28
      alFilteriv33060x646a6ff0
      alGenAuxiliaryEffectSlots33070x646a611c
      alGenBuffers33080x64696b3c
      alGenDatabuffersEXT33090x646a7720
      alGenEffects33100x646a4b2c
      alGenFilters33110x646a6d94
      alGenSources33120x6468d918
      alGetAuxiliaryEffectSlotf33130x646a6ab8
      alGetAuxiliaryEffectSlotfv33140x646a6b44
      alGetAuxiliaryEffectSloti33150x646a68f4
      alGetAuxiliaryEffectSlotiv33160x646a69a0
      alGetBoolean33170x6469d3ac
      alGetBooleanv33180x6469d63c
      alGetBuffer3f33190x6469755c
      alGetBuffer3i33200x646977e4
      alGetBufferSamplesSOFT33210x64696ec4
      alGetBufferf33220x646974bc
      alGetBufferfv33230x64697608
      alGetBufferi33240x646976a8
      alGetBufferiv33250x64697890
      alGetDatabufferSubDataEXT33260x646a7a94
      alGetDatabufferfEXT33270x646a7d30
      alGetDatabufferfvEXT33280x646a7dd0
      alGetDatabufferiEXT33290x646a7e70
      alGetDatabufferivEXT33300x646a7f28
      alGetDouble33310x6469d450
      alGetDoublev33320x6469d718
      alGetEffectf33330x646a5c60
      alGetEffectfv33340x646a5e6c
      alGetEffecti33350x646a5a24
      alGetEffectiv33360x646a5b48
      alGetEnumValue33370x6469d1ec
      alGetError33380x64690480
      alGetFilterf33390x646a73e4
      alGetFilterfv33400x646a7494
      alGetFilteri33410x646a727c
      alGetFilteriv33420x646a730c
      alGetFloat33430x6469d4dc
      alGetFloatv33440x6469d7fc
      alGetInteger33450x6469d568
      alGetIntegerv33460x6469d8e0
      alGetListener3f33470x646ae03c
      alGetListener3i33480x646ae2b0
      alGetListenerf33490x646adfa0
      alGetListenerfv33500x646ae114
      alGetListeneri33510x646ae250
      alGetListeneriv33520x646ae3e8
      alGetProcAddress33530x6469d1c8
      alGetSource3f33540x6468efb0
      alGetSource3i33550x6468f5a0
      alGetSourcef33560x6468ed64
      alGetSourcefv33570x6468f0ec
      alGetSourcei33580x6468f27c
      alGetSourceiv33590x6468f758
      alGetString33600x6469da0c
      alIsAuxiliaryEffectSlot33610x646a62f8
      alIsBuffer33620x64696c58
      alIsBufferFormatSupportedSOFT33630x646983a8
      alIsDatabufferEXT33640x646a7844
      alIsEffect33650x646a4c58
      alIsEnabled33660x6469d35c
      alIsExtensionPresent33670x6469d070
      alIsFilter33680x646a6ecc
      alIsSource33690x6468db54
      alListener3f33700x646ada10
      alListener3i33710x646add98
      alListenerf33720x646ad944
      alListenerfv33730x646adae0
      alListeneri33740x646add64
      alListeneriv33750x646adec8
      alMapDatabufferEXT33760x646a80e0
      alSelectDatabufferEXT33770x646a8030
      alSetError33780x646904b4
      alSource3f33790x6468e138
      alSource3i33800x6468e938
      alSourcePause33810x6468fc5c
      alSourcePausev33820x6468fcdc
      alSourcePlay33830x6468fc40
      alSourcePlayv33840x6468f960
      alSourceQueueBuffers33850x64690034
      alSourceRewind33860x64690018
      alSourceRewindv33870x6468ff14
      alSourceStop33880x6468fdb0
      alSourceStopv33890x6468fe30
      alSourceUnqueueBuffers33900x6469029c
      alSourcef33910x6468db98
      alSourcefv33920x6468e260
      alSourcei33930x6468e478
      alSourceiv33940x6468ebbc
      alSpeedOfSound33950x6469dc18
      alUnmapDatabufferEXT33960x646a81b0
      al_acknowledge_resize33970x645fb48c
      al_add_config_comment33980x645e694c
      al_add_config_section33990x645e6828
      al_add_new_bitmap_flag34000x64625b14
      al_add_timer_count34010x646248d4
      al_append_native_text_log34020x645d46e4
      al_append_path_component34030x64622aa8
      al_attach_audio_stream_to_mixer34040x645ca0e0
      al_attach_audio_stream_to_voice34050x645cc198
      al_attach_mixer_to_mixer34060x645ca118
      al_attach_mixer_to_voice34070x645cc330
      al_attach_sample_instance_to_mixer34080x645ca0a8
      al_attach_sample_instance_to_voice34090x645cbffc
      al_broadcast_cond34100x646242fc
      al_build_transform34110x64626998
      al_calculate_arc34120x645d80c4
      al_calculate_ribbon34130x645da8c4
      al_calculate_spline34140x645dacac
      al_calloc_with_context34150x64603780
      al_change_directory34160x64600cc4
      al_check_inverse34170x64626a78
      al_clear_to_color34180x645fe1d4
      al_clone_bitmap34190x645e2a9c
      al_clone_path34200x64622f40
      al_close_directory34210x64600c9c
      al_close_native_text_log34220x645d44c0
      al_color_cmyk34230x645cdf38
      al_color_cmyk_to_rgb34240x645cde70
      al_color_hsl34250x645cde0c
      al_color_hsl_to_rgb34260x645cd990
      al_color_hsv34270x645cd864
      al_color_hsv_to_rgb34280x645cd5a8
      al_color_html34290x645ce1f4
      al_color_html_to_rgb34300x645ce190
      al_color_name34310x645cd518
      al_color_name_to_rgb34320x645cd3d8
      al_color_rgb_to_cmyk34330x645cdea4
      al_color_rgb_to_hsl34340x645cdcc4
      al_color_rgb_to_hsv34350x645cd728
      al_color_rgb_to_html34360x645ce128
      al_color_rgb_to_name34370x645cd440
      al_color_rgb_to_yuv34380x645ce000
      al_color_yuv34390x645ce0a0
      al_color_yuv_to_rgb34400x645cdf7c
      al_compose_transform34410x64626c48
      al_convert_mask_to_alpha34420x645e26b0
      al_copy_transform34430x646268dc
      al_create_audio_stream34440x645cacf4
      al_create_bitmap34450x645e2674
      al_create_builtin_font34460x645cf420
      al_create_cond34470x64624270
      al_create_config34480x645e67f4
      al_create_display34490x645fb288
      al_create_event_queue34500x645fe860
      al_create_file_handle34510x645ff6d0
      al_create_fs_entry34520x64600bf4
      al_create_mixer34530x645c9eec
      al_create_mouse_cursor34540x6460b514
      al_create_mutex34550x6462416c
      al_create_mutex_recursive34560x646241b4
      al_create_native_file_dialog34570x645d4318
      al_create_path34580x64622df8
      al_create_path_for_directory34590x64622ed4
      al_create_sample34600x645ca6b0
      al_create_sample_instance34610x645c62d4
      al_create_sub_bitmap34620x645e2940
      al_create_thread34630x64623ea0
      al_create_timer34640x646245e8
      al_create_vertex_decl34650x645e0c74
      al_create_voice34660x645cbf14
      al_cstr34670x646585fc
      al_cstr_dup34680x64658660
      al_destroy_audio_stream34690x645cafc8
      al_destroy_bitmap34700x645e2378
      al_destroy_cond34710x646242b0
      al_destroy_config34720x645e747c
      al_destroy_display34730x645fb3bc
      al_destroy_event_queue34740x645fe72c
      al_destroy_font34750x645d0088
      al_destroy_fs_entry34760x64600c10
      al_destroy_mixer34770x645c93a4
      al_destroy_mouse_cursor34780x6460b540
      al_destroy_mutex34790x64624234
      al_destroy_native_file_dialog34800x645d420c
      al_destroy_path34810x64622d34
      al_destroy_sample34820x645ca3c8
      al_destroy_sample_instance34830x645c62a4
      al_destroy_thread34840x646240b4
      al_destroy_timer34850x646244c0
      al_destroy_user_event_source34860x645ff1ac
      al_destroy_vertex_decl34870x645e0da4
      al_destroy_voice34880x645cc4c8
      al_detach_audio_stream34890x645cb5e4
      al_detach_mixer34900x645ca3b0
      al_detach_sample_instance34910x645c6bdc
      al_detach_voice34920x645cc418
      al_drain_audio_stream34930x645cb06c
      al_draw_arc34940x645d9dc0
      al_draw_bitmap34950x645e3528
      al_draw_bitmap_region34960x645e35ac
      al_draw_circle34970x645d8bd8
      al_draw_ellipse34980x645d8648
      al_draw_elliptical_arc34990x645d8c58
      al_draw_filled_circle35000x645d8c1c
      al_draw_filled_ellipse35010x645d89cc
      al_draw_filled_pieslice35020x645d83e8
      al_draw_filled_rectangle35030x645d7fd8
      al_draw_filled_rounded_rectangle35040x645da4ac
      al_draw_filled_triangle35050x645d7c48
      al_draw_indexed_prim35060x645e0b28
      al_draw_justified_text35070x645cfb08
      al_draw_justified_textf35080x645cff08
      al_draw_justified_ustr35090x645cf750
      al_draw_line35100x645d6a08
      al_draw_pieslice35110x645d8ff8
      al_draw_pixel35120x645fe214
      al_draw_prim35130x645e0a38
      al_draw_rectangle35140x645d7d10
      al_draw_ribbon35150x645db154
      al_draw_rotated_bitmap35160x645e37c8
      al_draw_rounded_rectangle35170x645d9e14
      al_draw_scaled_bitmap35180x645e36b0
      al_draw_scaled_rotated_bitmap35190x645e396c
      al_draw_soft_line35200x645dbbe4
      al_draw_soft_triangle35210x645e09ec
      al_draw_spline35220x645daeac
      al_draw_text35230x645cf5cc
      al_draw_textf35240x645cfb70
      al_draw_tinted_bitmap35250x645e34b0
      al_draw_tinted_bitmap_region35260x645e343c
      al_draw_tinted_rotated_bitmap35270x645e3740
      al_draw_tinted_scaled_bitmap35280x645e362c
      al_draw_tinted_scaled_rotated_bitmap35290x645e3860
      al_draw_tinted_scaled_rotated_bitmap_region35300x645e38dc
      al_draw_triangle35310x645d6c3c
      al_draw_ustr35320x645cf460
      al_drop_next_event35330x645feb2c
      al_drop_path_tail35340x64622a68
      al_emit_user_event35350x645ff200
      al_fclearerr35360x645ff888
      al_fclose35370x645ff72c
      al_feof35380x645ff864
      al_ferror35390x645ff87c
      al_fflush35400x645ff7e8
      al_fget_ustr35410x646000ac
      al_fgetc35420x645ff894
      al_fgets35430x64600084
      al_filename_exists35440x64600cfc
      al_fixacos35450x64601cf8
      al_fixadd35460x646019dc
      al_fixasin35470x64601d34
      al_fixatan35480x64602470
      al_fixatan235490x646024c8
      al_fixceil35500x64601c2c
      al_fixcos35510x64601ca4
      al_fixdiv35520x64601b3c
      al_fixfloor35530x64601c18
      al_fixhypot35540x64602798
      al_fixmul35550x64601a88
      al_fixsin35560x64601cc0
      al_fixsqrt35570x646026a4
      al_fixsub35580x64601a34
      al_fixtan35590x64601cdc
      al_fixtof35600x646019d0
      al_fixtoi35610x64601c78
      al_fixtorad_r35620x647e889c
      al_flip_display35630x645fb434
      al_flush_event_queue35640x645fec1c
      al_fopen35650x645ff594
      al_fopen_fd35660x646009cc
      al_fopen_interface35670x645ff634
      al_fopen_slice35680x64600450
      al_fputc35690x645ff914
      al_fputs35700x64600124
      al_fread35710x645ff768
      al_fread16be35720x645ffcec
      al_fread16le35730x645ff958
      al_fread32be35740x645ffd9c
      al_fread32le35750x645ffa08
      al_free_with_context35760x64603730
      al_fs_entry_exists35770x64600c84
      al_fseek35780x645ff818
      al_fsize35790x6460019c
      al_ftell35800x645ff7f4
      al_ftofix35810x6460192c
      al_fungetc35820x64600170
      al_fwrite35830x645ff7d4
      al_fwrite16be35840x645ffed4
      al_fwrite16le35850x645ffb40
      al_fwrite32be35860x645fff68
      al_fwrite32le35870x645ffbd4
      al_get_allegro_acodec_version35880x645c1254
      al_get_allegro_audio_version35890x645c48c4
      al_get_allegro_color_version35900x645ce264
      al_get_allegro_font_version35910x645ceac4
      al_get_allegro_image_version35920x645d23c0
      al_get_allegro_memfile_version35930x645d4204
      al_get_allegro_native_dialog_version35940x645d44b8
      al_get_allegro_physfs_version35950x645d5c84
      al_get_allegro_primitives_version35960x645e0c6c
      al_get_allegro_ttf_version35970x645e2238
      al_get_allegro_version35980x645e2240
      al_get_app_name35990x64623d50
      al_get_audio_depth_size36000x645c47a0
      al_get_audio_stream_attached36010x645cb1a4
      al_get_audio_stream_channels36020x645cb174
      al_get_audio_stream_depth36030x645cb180
      al_get_audio_stream_event_source36040x645cbdcc
      al_get_audio_stream_fragment36050x645cb1b4
      al_get_audio_stream_fragments36060x645cb114
      al_get_audio_stream_frequency36070x645cb0fc
      al_get_audio_stream_gain36080x645cb15c
      al_get_audio_stream_length36090x645cb108
      al_get_audio_stream_length_secs36100x645cbcdc
      al_get_audio_stream_pan36110x645cb168
      al_get_audio_stream_playing36120x645cb198
      al_get_audio_stream_playmode36130x645cb18c
      al_get_audio_stream_position_secs36140x645cbc84
      al_get_audio_stream_speed36150x645cb150
      al_get_available_audio_stream_fragments36160x645cb120
      al_get_backbuffer36170x645fb41c
      al_get_bitmap_flags36180x645e280c
      al_get_bitmap_format36190x645e2804
      al_get_bitmap_height36200x645e27fc
      al_get_bitmap_width36210x645e27f4
      al_get_blender36220x6462574c
      al_get_channel_count36230x645c4790
      al_get_clipping_rectangle36240x645e28f0
      al_get_config_value36250x645e6ad4
      al_get_current_directory36260x64600cb4
      al_get_current_display36270x64625244
      al_get_current_transform36280x64626940
      al_get_d3d_device36290x6465fb34
      al_get_d3d_system_texture36300x6465fb40
      al_get_d3d_texture_position36310x6465fb58
      al_get_d3d_video_texture36320x6465fb4c
      al_get_default_mixer36330x645ca770
      al_get_display_event_source36340x645fb6c8
      al_get_display_flags36350x645fb524
      al_get_display_format36360x645fb50c
      al_get_display_height36370x645fb500
      al_get_display_mode36380x64601908
      al_get_display_option36390x645fb8d0
      al_get_display_refresh_rate36400x645fb518
      al_get_display_width36410x645fb4f4
      al_get_errno36420x64626688
      al_get_event_source_data36430x645ff324
      al_get_file_userdata36440x646001b0
      al_get_first_config_entry36450x645e75b8
      al_get_first_config_section36460x645e7568
      al_get_font_ascent36470x645d0010
      al_get_font_descent36480x645d001c
      al_get_font_line_height36490x645d0004
      al_get_fs_entry_atime36500x64600c48
      al_get_fs_entry_ctime36510x64600c60
      al_get_fs_entry_mode36520x64600c3c
      al_get_fs_entry_mtime36530x64600c54
      al_get_fs_entry_name36540x64600c24
      al_get_fs_entry_size36550x64600c6c
      al_get_fs_interface36560x64626428
      al_get_joystick36570x64601f44
      al_get_joystick_active36580x64601f5c
      al_get_joystick_axis_name36590x64601fc4
      al_get_joystick_button_name36600x64601ff4
      al_get_joystick_event_source36610x64601ed4
      al_get_joystick_name36620x64601f68
      al_get_joystick_num_axes36630x64601fac
      al_get_joystick_num_buttons36640x64601fec
      al_get_joystick_num_sticks36650x64601f74
      al_get_joystick_state36660x64602010
      al_get_joystick_stick_flags36670x64601f7c
      al_get_joystick_stick_name36680x64601f94
      al_get_keyboard_event_source36690x6460214c
      al_get_keyboard_state36700x646020f4
      al_get_mixer_attached36710x645ca250
      al_get_mixer_channels36720x645ca214
      al_get_mixer_depth36730x645ca220
      al_get_mixer_frequency36740x645ca208
      al_get_mixer_gain36750x645ca238
      al_get_mixer_playing36760x645ca244
      al_get_mixer_quality36770x645ca22c
      al_get_monitor_info36780x6460b4a0
      al_get_mouse_cursor_position36790x6460b748
      al_get_mouse_event_source36800x6460b7cc
      al_get_mouse_num_axes36810x6460b67c
      al_get_mouse_num_buttons36820x6460b670
      al_get_mouse_state36830x6460b6f0
      al_get_mouse_state_axis36840x6460b6fc
      al_get_native_file_dialog_count36850x645d43ac
      al_get_native_file_dialog_path36860x645d43b4
      al_get_native_text_log_event_source36870x645d4754
      al_get_new_bitmap_flags36880x64625ca4
      al_get_new_bitmap_format36890x64625bdc
      al_get_new_display_adapter36900x64624eac
      al_get_new_display_flags36910x64624b9c
      al_get_new_display_option36920x645fb84c
      al_get_new_display_refresh_rate36930x64624d24
      al_get_new_file_interface36940x64626290
      al_get_new_window_position36950x6462503c
      al_get_next_config_entry36960x645e7640
      al_get_next_config_section36970x645e7590
      al_get_next_event36980x645fea0c
      al_get_num_display_modes36990x646018f4
      al_get_num_joysticks37000x64601f30
      al_get_num_video_adapters37010x6460b478
      al_get_opengl_extension_list37020x6461ff78
      al_get_opengl_fbo37030x646214d8
      al_get_opengl_proc_address37040x64611988
      al_get_opengl_texture37050x64621444
      al_get_opengl_texture_position37060x6462156c
      al_get_opengl_texture_size37070x64621534
      al_get_opengl_variant37080x6460bdec
      al_get_opengl_version37090x6460bdc4
      al_get_org_name37100x64623d48
      al_get_parent_bitmap37110x645e2a90
      al_get_path_basename37120x64623190
      al_get_path_component37130x6462294c
      al_get_path_drive37140x6462307c
      al_get_path_extension37150x646230c8
      al_get_path_filename37160x646230b8
      al_get_path_num_components37170x64622944
      al_get_path_tail37180x64622a34
      al_get_pixel37190x645e424c
      al_get_pixel_format_bits37200x6462348c
      al_get_pixel_size37210x64623480
      al_get_sample37220x645c6e34
      al_get_sample_channels37230x645cac5c
      al_get_sample_data37240x645cac64
      al_get_sample_depth37250x645cac54
      al_get_sample_frequency37260x645cac44
      al_get_sample_instance_attached37270x645c66cc
      al_get_sample_instance_channels37280x645c6688
      al_get_sample_instance_depth37290x645c667c
      al_get_sample_instance_frequency37300x645c65f0
      al_get_sample_instance_gain37310x645c6640
      al_get_sample_instance_length37320x645c65fc
      al_get_sample_instance_pan37330x645c664c
      al_get_sample_instance_playing37340x645c66a0
      al_get_sample_instance_playmode37350x645c6694
      al_get_sample_instance_position37360x645c6608
      al_get_sample_instance_speed37370x645c6634
      al_get_sample_instance_time37380x645c6658
      al_get_sample_length37390x645cac4c
      al_get_separate_blender37400x64625844
      al_get_standard_path37410x64623be8
      al_get_system_config37420x64623bd4
      al_get_system_driver37430x64623bcc
      al_get_target_bitmap37440x6462549c
      al_get_text_dimensions37450x645d0034
      al_get_text_width37460x645cffd4
      al_get_thread_should_stop37470x64624088
      al_get_time37480x646694d8
      al_get_timer_count37490x64624860
      al_get_timer_event_source37500x64624934
      al_get_timer_speed37510x646247f0
      al_get_timer_started37520x646247e4
      al_get_ustr_dimensions37530x645d0028
      al_get_ustr_width37540x645cffc8
      al_get_voice_channels37550x645cc578
      al_get_voice_depth37560x645cc580
      al_get_voice_frequency37570x645cc528
      al_get_voice_playing37580x645cc588
      al_get_voice_position37590x645cc530
      al_get_win_window_handle37600x6466c1a8
      al_get_window_position37610x645fb618
      al_grab_font_from_bitmap37620x645cec50
      al_grab_mouse37630x6460b784
      al_have_d3d_non_pow2_texture_support37640x6465ec24
      al_have_d3d_non_square_texture_support37650x6465ed20
      al_have_opengl_extension37660x64611954
      al_hide_mouse_cursor37670x6460b5c4
      al_hold_bitmap_drawing37680x645fb6d0
      al_identity_transform37690x64626958
      al_inhibit_screensaver37700x64623d58
      al_init_acodec_addon37710x645c125c
      al_init_font_addon37720x645ce6a4
      al_init_image_addon37730x645d2154
      al_init_native_dialog_addon37740x645d42d4
      al_init_primitives_addon37750x645e0a08
      al_init_timeout37760x646695d8
      al_init_ttf_addon37770x645e2164
      al_init_user_event_source37780x645ff170
      al_insert_path_component37790x646229f8
      al_install_audio37800x645c4800
      al_install_joystick37810x64601e30
      al_install_keyboard37820x64602048
      al_install_mouse37830x6460b608
      al_install_system37840x6462391c
      al_invert_transform37850x64626a1c
      al_is_audio_installed37860x645c48b8
      al_is_bitmap_drawing_held37870x645fb77c
      al_is_bitmap_locked37880x645e4244
      al_is_compatible_bitmap37890x645fb4c8
      al_is_d3d_device_lost37900x6465fb78
      al_is_event_queue_empty37910x645fe9fc
      al_is_joystick_installed37920x64601ea4
      al_is_keyboard_installed37930x6460203c
      al_is_mouse_installed37940x6460b5fc
      al_is_sub_bitmap37950x645e2a80
      al_is_system_installed37960x64623bb8
      al_itofix37970x64601c70
      al_join_paths37980x64622ad0
      al_join_thread37990x64623fe4
      al_key_down38000x64602100
      al_keycode_to_name38010x646020c4
      al_load_audio_stream38020x645c50c4
      al_load_audio_stream_f38030x645c5190
      al_load_bitmap38040x645e3d78
      al_load_bitmap_f38050x645e3e80
      al_load_bitmap_font38060x645cf1ac
      al_load_config_file38070x645e7088
      al_load_config_file_f38080x645e6b68
      al_load_font38090x645ce9d8
      al_load_sample38100x645c4f84
      al_load_sample_f38110x645c502c
      al_load_ttf_font38120x645e20cc
      al_load_ttf_font_f38130x645e2098
      al_load_ttf_font_stretch38140x645e2118
      al_load_ttf_font_stretch_f38150x645e1de0
      al_lock_bitmap38160x645e4134
      al_lock_bitmap_region38170x645e3f60
      al_lock_mutex38180x646241fc
      al_make_directory38190x64600ce0
      al_make_path_canonical38200x646231fc
      al_make_temp_file38210x64600a40
      al_malloc_with_context38220x6460370c
      al_map_rgb38230x64623684
      al_map_rgb_f38240x646236e0
      al_map_rgba38250x64623640
      al_map_rgba_f38260x646236c0
      al_merge_config38270x645e71d4
      al_merge_config_into38280x645e71c4
      al_mouse_button_down38290x6460b730
      al_open_directory38300x64600c90
      al_open_fs_entry38310x64600d34
      al_open_memfile38320x645d40e4
      al_open_native_text_log38330x645d45d8
      al_path_cstr38340x64622cac
      al_peek_next_event38350x645fea7c
      al_play_sample38360x645caab8
      al_play_sample_instance38370x645c6474
      al_print38380x6469bbd8
      al_put_blended_pixel38390x645e5db4
      al_put_pixel38400x645e5d7c
      al_radtofix_r38410x647e8898
      al_read_directory38420x64600ca8
      al_realloc_with_context38430x64603754
      al_rebase_path38440x64622b88
      al_reconfigure_joysticks38450x64601eb0
      al_ref_buffer38460x646586d8
      al_ref_cstr38470x6465869c
      al_ref_ustr38480x646586f4
      al_register_assert_handler38490x645fb27c
      al_register_audio_stream_loader38500x645c4d54
      al_register_audio_stream_loader_f38510x645c4e6c
      al_register_bitmap_loader38520x645e3a28
      al_register_bitmap_loader_f38530x645e3bd0
      al_register_bitmap_saver38540x645e3afc
      al_register_bitmap_saver_f38550x645e3ca4
      al_register_event_source38560x645fe908
      al_register_font_loader38570x645ce930
      al_register_sample_loader38580x645c48f4
      al_register_sample_loader_f38590x645c4a0c
      al_register_sample_saver38600x645c4b24
      al_register_sample_saver_f38610x645c4c3c
      al_release_joystick38620x64601f50
      al_remove_filename38630x64600d18
      al_remove_fs_entry38640x64600c78
      al_remove_opengl_fbo38650x6462145c
      al_remove_path_component38660x646229b8
      al_replace_path_component38670x6462297c
      al_reserve_samples38680x645ca870
      al_reset_clipping_rectangle38690x645e288c
      al_reset_new_display_options38700x645fbba0
      al_resize_display38710x645fb4ac
      al_rest38720x6466958c
      al_restore_default_mixer38730x645ca9ac
      al_restore_state38740x64625ff0
      al_rewind_audio_stream38750x645cbbc0
      al_rotate_transform38760x64626b50
      al_run_detached_thread38770x64623f24
      al_run_main38780x645e2248
      al_save_bitmap38790x645e3df4
      al_save_bitmap_f38800x645e3ee8
      al_save_config_file38810x645e7178
      al_save_config_file_f38820x645e70c8
      al_save_sample38830x645c5248
      al_save_sample_f38840x645c5300
      al_scale_transform38850x64626bdc
      al_seek_audio_stream_secs38860x645cbc18
      al_set_app_name38870x64623cbc
      al_set_audio_stream_fragment38880x645cb604
      al_set_audio_stream_gain38890x645cb360
      al_set_audio_stream_loop_secs38900x645cbd34
      al_set_audio_stream_pan38910x645cb3fc
      al_set_audio_stream_playing38920x645cb53c
      al_set_audio_stream_playmode38930x645cb4f4
      al_set_audio_stream_speed38940x645cb244
      al_set_blender38950x64625560
      al_set_clipping_rectangle38960x645e2814
      al_set_config_value38970x645e68e4
      al_set_current_opengl_context38980x64621834
      al_set_default_mixer38990x645ca778
      al_set_display_flag39000x645fb650
      al_set_display_icon39010x645fb558
      al_set_display_icons39020x645fb590
      al_set_errno39030x64626750
      al_set_event_source_data39040x645ff318
      al_set_exe_name39050x64623c58
      al_set_fs_interface39060x646264f8
      al_set_keyboard_leds39070x646020b0
      al_set_memory_interface39080x64603700
      al_set_mixer_frequency39090x645ca260
      al_set_mixer_gain39100x645ca314
      al_set_mixer_playing39110x645ca39c
      al_set_mixer_postprocess_callback39120x645ca1a4
      al_set_mixer_quality39130x645ca29c
      al_set_mouse_axis39140x6460b6d4
      al_set_mouse_cursor39150x6460b568
      al_set_mouse_w39160x6460b6b4
      al_set_mouse_xy39170x6460b688
      al_set_mouse_z39180x6460b694
      al_set_new_bitmap_flags39190x64625a40
      al_set_new_bitmap_format39200x64625978
      al_set_new_display_adapter39210x64624de8
      al_set_new_display_flags39220x64624ad8
      al_set_new_display_option39230x645fb7ac
      al_set_new_display_refresh_rate39240x64624c60
      al_set_new_file_interface39250x64626360
      al_set_new_window_position39260x64624f70
      al_set_org_name39270x64623c8c
      al_set_path_drive39280x64623050
      al_set_path_extension39290x64623120
      al_set_path_filename39300x6462308c
      al_set_physfs_file_interface39310x645d5c6c
      al_set_sample39320x645c6bf4
      al_set_sample_instance_gain39330x645c68dc
      al_set_sample_instance_length39340x645c6750
      al_set_sample_instance_pan39350x645c6978
      al_set_sample_instance_playing39360x645c6b10
      al_set_sample_instance_playmode39370x645c6a70
      al_set_sample_instance_position39380x645c66dc
      al_set_sample_instance_speed39390x645c6790
      al_set_separate_blender39400x64625654
      al_set_standard_file_interface39410x64600a2c
      al_set_standard_fs_interface39420x646265c0
      al_set_system_mouse_cursor39430x6460b588
      al_set_target_backbuffer39440x64625480
      al_set_target_bitmap39450x64625308
      al_set_thread_should_stop39460x64624080
      al_set_timer_count39470x64624874
      al_set_timer_speed39480x646247fc
      al_set_voice_playing39490x645cc62c
      al_set_voice_position39500x645cc5d4
      al_set_window_position39510x645fb5ec
      al_set_window_title39520x645fb6a8
      al_show_mouse_cursor39530x6460b5ac
      al_show_native_file_dialog39540x645d43a4
      al_show_native_message_box39550x645d43dc
      al_shutdown_font_addon39560x645ce8cc
      al_shutdown_image_addon39570x645d214c
      al_shutdown_native_dialog_addon39580x645d42b4
      al_shutdown_primitives_addon39590x645e09f4
      al_shutdown_ttf_addon39600x645e21fc
      al_signal_cond39610x64624304
      al_start_thread39620x64623f9c
      al_start_timer39630x64624680
      al_stop_sample39640x645cabc0
      al_stop_sample_instance39650x645c6524
      al_stop_samples39660x645cac0c
      al_stop_timer39670x64624730
      al_store_state39680x64625d6c
      al_toggle_display_flag39690x645fb67c
      al_transform_coordinates39700x64626c18
      al_translate_transform39710x64626b34
      al_ungrab_mouse39720x6460b7ac
      al_uninstall_audio39730x645c45d8
      al_uninstall_joystick39740x64601e04
      al_uninstall_keyboard39750x6460201c
      al_uninstall_mouse39760x6460b5dc
      al_uninstall_system39770x64623854
      al_unlock_bitmap39780x645e4178
      al_unlock_mutex39790x64624218
      al_unmap_rgb39800x64623790
      al_unmap_rgb_f39810x64623834
      al_unmap_rgba39820x64623700
      al_unmap_rgba_f39830x64623808
      al_unref_user_event39840x645fef68
      al_unregister_event_source39850x645fe970
      al_update_display_region39860x645fb450
      al_update_fs_entry39870x64600c30
      al_use_transform39880x646268f0
      al_ustr_append39890x64658cf0
      al_ustr_append_chr39900x64658d30
      al_ustr_append_cstr39910x64658d10
      al_ustr_appendf39920x64658ed0
      al_ustr_assign39930x6465903c
      al_ustr_assign_cstr39940x64659090
      al_ustr_assign_substr39950x6465905c
      al_ustr_compare39960x64659b80
      al_ustr_dup39970x6465867c
      al_ustr_dup_substr39980x64658684
      al_ustr_empty_string39990x64658694
      al_ustr_encode_utf1640000x6465a498
      al_ustr_equal40010x64659b60
      al_ustr_find_chr40020x646593e0
      al_ustr_find_cset40030x646597e0
      al_ustr_find_cset_cstr40040x64659968
      al_ustr_find_cstr40050x646599c0
      al_ustr_find_replace40060x64659aac
      al_ustr_find_replace_cstr40070x64659adc
      al_ustr_find_set40080x64659618
      al_ustr_find_set_cstr40090x64659790
      al_ustr_find_str40100x646599b8
      al_ustr_free40110x646585f4
      al_ustr_get40120x646588dc
      al_ustr_get_next40130x64658a1c
      al_ustr_has_prefix40140x64659f00
      al_ustr_has_prefix_cstr40150x64659f34
      al_ustr_has_suffix40160x64659f9c
      al_ustr_has_suffix_cstr40170x6465a03c
      al_ustr_insert40180x64658b14
      al_ustr_insert_chr40190x64658ba0
      al_ustr_insert_cstr40200x64658b44
      al_ustr_length40210x64658774
      al_ustr_ltrim_ws40220x64658ff4
      al_ustr_ncompare40230x64659d38
      al_ustr_new40240x646585e4
      al_ustr_new_from_buffer40250x646585ec
      al_ustr_new_from_utf1640260x6465a24c
      al_ustr_newf40270x64658ef8
      al_ustr_next40280x6465884c
      al_ustr_offset40290x646587c0
      al_ustr_prev40300x6465889c
      al_ustr_prev_get40310x64658ac0
      al_ustr_remove_chr40320x64658f30
      al_ustr_remove_range40330x64658fa8
      al_ustr_replace_range40340x646593a4
      al_ustr_rfind_chr40350x646594f4
      al_ustr_rfind_cstr40360x64659a44
      al_ustr_rfind_str40370x64659a10
      al_ustr_rtrim_ws40380x6465900c
      al_ustr_set_chr40390x646590b0
      al_ustr_size40400x64658760
      al_ustr_size_utf1640410x6465a400
      al_ustr_to_buffer40420x6465860c
      al_ustr_trim_ws40430x64659024
      al_ustr_truncate40440x64658fd4
      al_ustr_vappendf40450x64658e80
      al_utf16_encode40460x6465a204
      al_utf16_width40470x6465a1e4
      al_utf8_encode40480x6465a140
      al_utf8_width40490x6465a100
      al_wait_cond40500x646242ec
      al_wait_cond_until40510x646242f4
      al_wait_for_event40520x645fed2c
      al_wait_for_event_timed40530x645fedb0
      al_wait_for_event_until40540x645fee08
      al_wait_for_vsync40550x645fb530
      alcCaptureCloseDevice40560x64699b88
      alcCaptureOpenDevice40570x6469ca44
      alcCaptureSamples40580x64698ea4
      alcCaptureStart40590x64699064
      alcCaptureStop40600x64698f8c
      alcCloseDevice40610x6469977c
      alcCreateContext40620x6469a920
      alcDSoundDeinit40630x646ab5c4
      alcDSoundInit40640x646ab5ac
      alcDSoundProbe40650x646ab634
      alcDestroyContext40660x64699388
      alcGetContextsDevice40670x6469a59c
      alcGetCurrentContext40680x64699854
      alcGetEnumValue40690x6469a650
      alcGetError40700x64698ca0
      alcGetIntegerv40710x6469b20c
      alcGetProcAddress40720x646992e4
      alcGetString40730x64699fc0
      alcGetThreadContext40740x64698df8
      alcIsExtensionPresent40750x64699e18
      alcIsRenderFormatSupported40760x6469a6f4
      alcLoopbackOpenDevice40770x6469993c
      alcMakeContextCurrent40780x64699140
      alcOpenDevice40790x6469c434
      alcProcessContext40800x64698d10
      alcRenderSamples40810x64699cd0
      alcSetError40820x6469cca4
      alcSetThreadContext40830x64699218
      alcSuspendContext40840x64698d84
      alcWinMMDeinit40850x646aca90
      alcWinMMInit40860x646aca78
      alcWinMMProbe40870x646acb24
      alc_loopback_deinit40880x646ad93c
      alc_loopback_init40890x646ad924
      alc_loopback_probe40900x646ad940
      alc_null_deinit40910x646acf20
      alc_null_init40920x646acf08
      alc_null_probe40930x646acf24
      alc_wave_deinit40940x646ad890
      alc_wave_init40950x646ad878
      alc_wave_probe40960x646ad894
      allocate_sample_buffer40970x64736130
      aluCart2LUTpos40980x646a947c
      aluHandleDisconnect40990x646a4988
      aluInitPanning41000x646a951c
      aluMixData41010x646a09a0
      autofit_module_class41020x64817860
      bdf_cmap_class41030x6482cb60
      bdf_driver_class41040x6482cae0
      bitreader_read_from_client_41050x647108cc
      bs2b_clear41060x646aa8e4
      bs2b_cross_feed41070x646aa91c
      bs2b_get_level41080x646aa8b8
      bs2b_get_srate41090x646aa8dc
      bs2b_is_clear41100x646aa8fc
      bs2b_set_level41110x646aa8a0
      bs2b_set_srate41120x646aa8c0
      buffer_mod_dfs41130x647de4c0
      cff_cmap_encoding_class_rec41140x64819700
      cff_cmap_unicode_class_rec41150x648196c0
      cff_driver_class41160x64819740
      crc3241170x64765908
      crc32_combine41180x64765bc4
      crc32_combine6441190x64765bd8
      create_sample_buffer41200x647360c4
      destroy_sample_buffer41210x647361a4
      drft_backward41220x6472c0f8
      drft_clear41230x6472c628
      drft_forward41240x6472bed4
      drft_init41250x6472c398
      duh_encapsulate_it_sigrenderer41260x6473f3ec
      duh_encapsulate_raw_sigrenderer41270x64735934
      duh_end_renderer41280x64735130
      duh_end_sigrenderer41290x647358fc
      duh_get_it_sigdata41300x647621f0
      duh_get_it_sigrenderer41310x6473f418
      duh_get_length41320x64735f84
      duh_get_raw_sigdata41330x647626a8
      duh_get_raw_sigrenderer41340x647359a8
      duh_render41350x64734fe0
      duh_render_signal41360x6473565c
      duh_renderer_decompose_to_sigrenderer41370x64735148
      duh_renderer_encapsulate_sigrenderer41380x64735138
      duh_renderer_get_n_channels41390x64735120
      duh_renderer_get_position41400x64735128
      duh_renderer_get_sigrenderer41410x64735140
      duh_set_length41420x64735f94
      duh_sigrenderer_generate_samples41430x647352e8
      duh_sigrenderer_get_current_sample41440x647358e0
      duh_sigrenderer_get_n_channels41450x64735298
      duh_sigrenderer_get_position41460x647352a8
      duh_sigrenderer_get_samples41470x647353dc
      duh_sigrenderer_set_analyser_callback41480x64735250
      duh_sigrenderer_set_callback41490x64735220
      duh_sigrenderer_set_sample_analyser_callback41500x64735280
      duh_sigrenderer_set_sigparam41510x647352bc
      duh_start_renderer41520x64734fb4
      duh_start_sigrenderer41530x64735150
      dumb_atexit41540x64735fa4
      dumb_click_remover_get_offset41550x64742d7c
      dumb_click_remover_get_offset_array41560x64743060
      dumb_create_click_remover41570x64742b24
      dumb_create_click_remover_array41580x64742dc8
      dumb_destroy_click_remover41590x64742d8c
      dumb_destroy_click_remover_array41600x64743090
      dumb_end_resampler41610x64756d68
      dumb_end_resampler_1641620x6475c370
      dumb_end_resampler_841630x64761b74
      dumb_end_resampler_n41640x647621d8
      dumb_exit41650x64736000
      dumb_it_build_checkpoints41660x6473f5b4
      dumb_it_callback_midi_block41670x6473f5ac
      dumb_it_callback_terminate41680x64738838
      dumb_it_do_initial_runthrough41690x6473f9ec
      dumb_it_max_to_mix41700x647ddae0
      dumb_it_sd_get_initial_channel_volume41710x64762344
      dumb_it_sd_get_initial_global_volume41720x647622c4
      dumb_it_sd_get_initial_speed41730x64762304
      dumb_it_sd_get_initial_tempo41740x64762324
      dumb_it_sd_get_instrument_filename41750x647622a4
      dumb_it_sd_get_instrument_name41760x64762284
      dumb_it_sd_get_mixing_volume41770x647622e4
      dumb_it_sd_get_n_instruments41780x64762244
      dumb_it_sd_get_n_orders41790x64762224
      dumb_it_sd_get_n_samples41800x64762234
      dumb_it_sd_get_sample_filename41810x6476226c
      dumb_it_sd_get_sample_name41820x64762254
      dumb_it_sd_get_song_message41830x64762214
      dumb_it_sd_set_initial_channel_volume41840x64762360
      dumb_it_sd_set_initial_global_volume41850x647622d4
      dumb_it_sd_set_initial_speed41860x64762314
      dumb_it_sd_set_initial_tempo41870x64762334
      dumb_it_sd_set_mixing_volume41880x647622f4
      dumb_it_set_loop_callback41890x6473f308
      dumb_it_set_midi_callback41900x6473f344
      dumb_it_set_xm_speed_zero_callback41910x6473f324
      dumb_it_sr_get_channel_muted41920x64762478
      dumb_it_sr_get_channel_state41930x6473f434
      dumb_it_sr_get_channel_volume41940x64762418
      dumb_it_sr_get_current_order41950x64762378
      dumb_it_sr_get_current_row41960x64762390
      dumb_it_sr_get_global_volume41970x647623a8
      dumb_it_sr_get_speed41980x647623f0
      dumb_it_sr_get_tempo41990x647623cc
      dumb_it_sr_set_channel_muted42000x64762450
      dumb_it_sr_set_channel_volume42010x64762434
      dumb_it_sr_set_global_volume42020x647623bc
      dumb_it_sr_set_speed42030x64762404
      dumb_it_sr_set_tempo42040x647623e0
      dumb_it_start_at_order42050x6473f364
      dumb_read_it42060x64736034
      dumb_read_it_quick42070x64738660
      dumb_read_mod42080x647360a0
      dumb_read_mod_quick42090x64741aa4
      dumb_read_s3m42100x6473607c
      dumb_read_s3m_quick42110x64740c6c
      dumb_read_xm42120x64736058
      dumb_read_xm_quick42130x6473fa20
      dumb_record_click42140x64742b50
      dumb_record_click_array42150x64742e34
      dumb_record_click_negative_array42160x64742ed8
      dumb_remove_clicks42170x64742ba4
      dumb_remove_clicks_array42180x64742f7c
      dumb_resample_16_1_142190x64756ec4
      dumb_resample_16_1_242200x6475717c
      dumb_resample_16_2_142210x64759310
      dumb_resample_16_2_242220x64759718
      dumb_resample_1_142230x64750cb4
      dumb_resample_1_242240x64750fe0
      dumb_resample_2_142250x64753604
      dumb_resample_2_242260x64753b0c
      dumb_resample_8_1_142270x6475c4c8
      dumb_resample_8_1_242280x6475c77c
      dumb_resample_8_2_142290x6475e8ac
      dumb_resample_8_2_242300x6475ecc4
      dumb_resample_get_current_sample_16_1_142310x64756f00
      dumb_resample_get_current_sample_16_1_242320x6475905c
      dumb_resample_get_current_sample_16_2_142330x64759358
      dumb_resample_get_current_sample_16_2_242340x6475bf90
      dumb_resample_get_current_sample_1_142350x64750cf0
      dumb_resample_get_current_sample_1_242360x647532bc
      dumb_resample_get_current_sample_2_142370x6475364c
      dumb_resample_get_current_sample_2_242380x64756878
      dumb_resample_get_current_sample_8_1_142390x6475c504
      dumb_resample_get_current_sample_8_1_242400x6475e608
      dumb_resample_get_current_sample_8_2_142410x6475e8f4
      dumb_resample_get_current_sample_8_2_242420x6476179c
      dumb_resample_get_current_sample_n_1_142430x647620d0
      dumb_resample_get_current_sample_n_1_242440x6476210c
      dumb_resample_get_current_sample_n_2_142450x64762150
      dumb_resample_get_current_sample_n_2_242460x64762194
      dumb_resample_n_1_142470x64761ec8
      dumb_resample_n_1_242480x64761f68
      dumb_resample_n_2_142490x64761fc0
      dumb_resample_n_2_242500x64762078
      dumb_resampling_quality42510x647de4d4
      dumb_reset_resampler42520x64750bb8
      dumb_reset_resampler_1642530x64756d7c
      dumb_reset_resampler_842540x6475c384
      dumb_reset_resampler_n42550x64761b88
      dumb_silence42560x647361d0
      dumb_start_resampler42570x64750c2c
      dumb_start_resampler_1642580x64756e14
      dumb_start_resampler_842590x6475c41c
      dumb_start_resampler_n42600x64761ce8
      dumbfile_cgetsl42610x64735e4c
      dumbfile_cgetul42620x64735df0
      dumbfile_close42630x64735f54
      dumbfile_error42640x64735f48
      dumbfile_getc42650x64735b6c
      dumbfile_getnc42660x64735eb4
      dumbfile_igetl42670x64735c88
      dumbfile_igetw42680x64735ba8
      dumbfile_mgetl42690x64735d3c
      dumbfile_mgetw42700x64735c18
      dumbfile_open42710x64735a64
      dumbfile_open_ex42720x64735aac
      dumbfile_pos42730x64735af8
      dumbfile_skip42740x64735b00
      floor0_exportbundle42750x648135e0
      floor1_encode42760x64731578
      floor1_exportbundle42770x64813620
      floor1_fit42780x64730b64
      floor1_interpolate_fit42790x647314d8
      ft_corner_is_flat42800x64768c74
      ft_corner_orientation42810x64768b64
      ft_glyphslot_alloc_bitmap42820x64769628
      ft_glyphslot_free_bitmap42830x64769584
      ft_glyphslot_set_bitmap42840x647695d8
      ft_grays_raster42850x6482c8dc
      ft_highpow242860x647744c4
      ft_lzwstate_done42870x647bda0c
      ft_lzwstate_init42880x647bd98c
      ft_lzwstate_io42890x647bda90
      ft_lzwstate_reset42900x647bd950
      ft_mem_alloc42910x647738d8
      ft_mem_dup42920x64774208
      ft_mem_free42930x647741f0
      ft_mem_qalloc42940x64773948
      ft_mem_qrealloc42950x64774104
      ft_mem_realloc42960x6477398c
      ft_mem_strcpyn42970x64774300
      ft_mem_strdup42980x6477427c
      ft_module_get_service42990x6476bf18
      ft_raster1_renderer_class43000x6482bf40
      ft_raster5_renderer_class43010x6482bee0
      ft_service_list_lookup43020x64769480
      ft_smooth_lcd_renderer_class43030x6482c840
      ft_smooth_lcdv_renderer_class43040x6482c7e0
      ft_smooth_renderer_class43050x6482c8a0
      ft_standard_raster43060x6482bf7c
      ft_stub_set_char_sizes43070x6476c3a4
      ft_stub_set_pixel_sizes43080x6476c41c
      ft_synthesize_vertical_metrics43090x6476a024
      ft_validator_error43100x647694f0
      ft_validator_init43110x647694c8
      ft_validator_run43120x647694e8
      g_CrcTable43130x64878b20
      get_crc_table43140x64765900
      inflate43150x64762fa8
      inflateCopy43160x647655a8
      inflateEnd43170x64765170
      inflateGetHeader43180x647652a8
      inflateInit2_43190x64762d50
      inflateInit_43200x64762e4c
      inflateMark43210x64765720
      inflatePrime43220x64762f48
      inflateReset43230x64762b4c
      inflateReset243240x64762bfc
      inflateSetDictionary43250x647651c8
      inflateSync43260x647652d8
      inflateSyncPoint43270x6476557c
      inflateUndermine43280x647656f8
      inflate_copyright43290x648174a0
      inflate_fast43300x647668c8
      inflate_table43310x64766058
      k7zSignature43320x647dd374
      kMaskToAllowedStatus43330x647f9f68
      kMaskToBitNumber43340x647f9f60
      kUtf8Limits43350x647dd37c
      make_duh43360x64742804
      mapping0_exportbundle43370x64813520
      mdct_backward43380x64728b14
      mdct_clear43390x64728ad8
      mdct_forward43400x64728e44
      mdct_init43410x64728888
      null_funcs43420x647dd600
      ogg_packet_clear43430x64733f74
      ogg_page_bos43440x64732b9c
      ogg_page_checksum_set43450x64732e34
      ogg_page_continued43460x64732b8c
      ogg_page_eos43470x64732bac
      ogg_page_granulepos43480x64732bbc
      ogg_page_packets43490x64732c94
      ogg_page_pageno43500x64732c6c
      ogg_page_serialno43510x64732c44
      ogg_page_version43520x64732b80
      ogg_stream_check43530x64732d78
      ogg_stream_clear43540x64732d94
      ogg_stream_destroy43550x64732de0
      ogg_stream_eos43560x647332f4
      ogg_stream_flush43570x64733220
      ogg_stream_init43580x64732cbc
      ogg_stream_iovecin43590x64732ee0
      ogg_stream_packetin43600x647331d4
      ogg_stream_packetout43610x64733d74
      ogg_stream_packetpeek43620x64733e78
      ogg_stream_pagein43630x647336d4
      ogg_stream_pageout43640x6473323c
      ogg_stream_pageout_fill43650x64733298
      ogg_stream_reset43660x64733c48
      ogg_stream_reset_serialno43670x64733cd4
      ogg_sync_buffer43680x647333a0
      ogg_sync_check43690x64733394
      ogg_sync_clear43700x6473332c
      ogg_sync_destroy43710x6473335c
      ogg_sync_init43720x64733314
      ogg_sync_pageout43730x64733684
      ogg_sync_pageseek43740x6473347c
      ogg_sync_reset43750x64733c0c
      ogg_sync_wrote43760x64733458
      oggpackB_adv43770x64734bc8
      oggpackB_adv143780x64734c44
      oggpackB_bits43790x64734f94
      oggpackB_bytes43800x64734f74
      oggpackB_get_buffer43810x64734fac
      oggpackB_look43820x64734a60
      oggpackB_look143830x64734b44
      oggpackB_read43840x64734d70
      oggpackB_read143850x64734ee8
      oggpackB_readinit43860x64734980
      oggpackB_reset43870x647348dc
      oggpackB_write43880x6473404c
      oggpackB_writealign43890x64734360
      oggpackB_writecheck43900x647342ac
      oggpackB_writeclear43910x6473492c
      oggpackB_writecopy43920x64734680
      oggpackB_writeinit43930x64734254
      oggpackB_writetrunc43940x64734300
      oggpack_adv43950x64734b6c
      oggpack_adv143960x64734c24
      oggpack_bits43970x64734f64
      oggpack_bytes43980x64734f44
      oggpack_get_buffer43990x64734fa4
      oggpack_look44000x647349a8
      oggpack_look144010x64734b20
      oggpack_read44020x64734c64
      oggpack_read144030x64734e94
      oggpack_readinit44040x64734958
      oggpack_reset44050x647348b8
      oggpack_write44060x647340e4
      oggpack_writealign44070x64734334
      oggpack_writecheck44080x6473428c
      oggpack_writeclear44090x64734900
      oggpack_writecopy44100x647343fc
      oggpack_writeinit44110x6473421c
      oggpack_writetrunc44120x647342cc
      ov_bitrate44130x6471c3f4
      ov_bitrate_instant44140x6471c13c
      ov_clear44150x6471b9f0
      ov_comment44160x6471c744
      ov_crosslap44170x6471cd40
      ov_fopen44180x6471be10
      ov_halfrate44190x6471bee0
      ov_halfrate_p44200x6471c030
      ov_info44210x6471c70c
      ov_open44220x6471bd6c
      ov_open_callbacks44230x6471bce0
      ov_pcm_seek44240x6471afc8
      ov_pcm_seek_lap44250x6471d04c
      ov_pcm_seek_page44260x6471a108
      ov_pcm_seek_page_lap44270x6471d068
      ov_pcm_tell44280x6471c594
      ov_pcm_total44290x6471c2cc
      ov_raw_seek44300x647191fc
      ov_raw_seek_lap44310x6471d030
      ov_raw_tell44320x6471c574
      ov_raw_total44330x6471c204
      ov_read44340x6471cc20
      ov_read_filter44350x6471c77c
      ov_read_float44360x6471cc74
      ov_seekable44370x6471c134
      ov_serialnumber44380x6471c1c0
      ov_streams44390x6471c12c
      ov_test44400x6471c080
      ov_test_callbacks44410x6471c04c
      ov_test_open44420x6471c0cc
      ov_time_seek44430x6471b21c
      ov_time_seek_lap44440x6471d084
      ov_time_seek_page44450x6471b0c8
      ov_time_seek_page_lap44460x6471d09c
      ov_time_tell44470x6471c5b4
      ov_time_total44480x6471c360
      pcf_cmap_class44490x6481bd60
      pcf_driver_class44500x6481bce0
      pfr_cmap_class_rec44510x6481b2a0
      pfr_driver_class44520x6481b220
      pfr_metrics_service_rec44530x6481b288
      ps_hints_apply44540x647a6e20
      ps_parser_funcs44550x6481c580
      ps_table_funcs44560x6481c5b4
      psaux_module_class44570x6481c500
      pshinter_module_class44580x6482be80
      psnames_module_class44590x6481cb00
      register_dumbfile_system44600x64735a58
      res0_free_info44610x6472ec90
      res0_free_look44620x6472ec04
      res0_inverse44630x6472e7cc
      res0_look44640x6472e834
      res0_pack44650x6472eaa0
      res0_unpack44660x6472f0ec
      res1_class44670x6472e290
      res1_forward44680x6472efb0
      res1_inverse44690x6472e764
      res2_class44700x6472e0b0
      res2_forward44710x6472f020
      res2_inverse44720x6472de98
      residue0_exportbundle44730x648135a0
      residue1_exportbundle44740x64813580
      residue2_exportbundle44750x64813560
      sfnt_module_class44760x6482c0c0
      t1_builder_funcs44770x6481c560
      t1_cmap_classes44780x6481c524
      t1_cmap_custom_class_rec44790x6481c440
      t1_cmap_expert_class_rec44800x6481c480
      t1_cmap_standard_class_rec44810x6481c4c0
      t1_cmap_unicode_class_rec44820x6481c400
      t1_decoder_funcs44830x6481c540
      t1_driver_class44840x64818a40
      t1cid_driver_class44850x6481a780
      t42_driver_class44860x6481b480
      tt_cmap0_class_rec44870x6482c300
      tt_cmap10_class_rec44880x6482c1c0
      tt_cmap12_class_rec44890x6482c180
      tt_cmap13_class_rec44900x6482c140
      tt_cmap14_class_rec44910x6482c100
      tt_cmap2_class_rec44920x6482c2c0
      tt_cmap4_class_rec44930x6482c280
      tt_cmap6_class_rec44940x6482c240
      tt_cmap8_class_rec44950x6482c200
      tt_default_graphics_state44960x64818280
      tt_driver_class44970x648182e0
      unload_duh44980x647359c4
      vorbis_analysis_blockout44990x6471fa28
      vorbis_analysis_buffer45000x6471f7e0
      vorbis_analysis_headerout45010x6471e494
      vorbis_analysis_init45020x6471f75c
      vorbis_analysis_wrote45030x6471f8b8
      vorbis_bitrate_addblock45040x64729328
      vorbis_bitrate_clear45050x647292f8
      vorbis_bitrate_flushpacket45060x64729850
      vorbis_bitrate_init45070x647291b8
      vorbis_bitrate_managed45080x64729308
      vorbis_block_clear45090x6471ef44
      vorbis_block_init45100x6471edb8
      vorbis_book_clear45110x64721540
      vorbis_book_codelen45120x64721d38
      vorbis_book_codeword45130x64721d1c
      vorbis_book_decode45140x647260a4
      vorbis_book_decodev_add45150x647264bc
      vorbis_book_decodev_set45160x64726a80
      vorbis_book_decodevs_add45170x6472623c
      vorbis_book_decodevv_add45180x64726cb0
      vorbis_book_encode45190x64726048
      vorbis_book_init_decode45200x64721770
      vorbis_book_init_encode45210x647215a8
      vorbis_comment_add45220x6471d658
      vorbis_comment_add_tag45230x6471d6f4
      vorbis_comment_clear45240x6471d92c
      vorbis_comment_init45250x6471d648
      vorbis_comment_query45260x6471d76c
      vorbis_comment_query_count45270x6471d850
      vorbis_commentheader_out45280x6471e400
      vorbis_dsp_clear45290x6471f024
      vorbis_granule_time45300x6471ec34
      vorbis_info_blocksize45310x6471d9a0
      vorbis_info_clear45320x6471d9f0
      vorbis_info_init45330x6471d9bc
      vorbis_lpc_from_data45340x64726f0c
      vorbis_lpc_predict45350x6472711c
      vorbis_lpc_to_lsp45360x64732270
      vorbis_lsp_to_curve45370x6473208c
      vorbis_packet_blocksize45380x6471d3c4
      vorbis_staticbook_destroy45390x647214f0
      vorbis_staticbook_pack45400x647258d0
      vorbis_staticbook_unpack45410x64725ca8
      vorbis_synthesis45420x6471d0b4
      vorbis_synthesis_blockin45430x647200c4
      vorbis_synthesis_halfrate45440x6471d444
      vorbis_synthesis_halfrate_p45450x6471d474
      vorbis_synthesis_headerin45460x6471dc48
      vorbis_synthesis_idheader45470x6471db4c
      vorbis_synthesis_init45480x64720018
      vorbis_synthesis_lapout45490x6472099c
      vorbis_synthesis_pcmout45500x647208f4
      vorbis_synthesis_read45510x64720974
      vorbis_synthesis_restart45520x6471ff98
      vorbis_synthesis_trackonly45530x6471d2bc
      vorbis_version_string45540x6471ec7c
      vorbis_window45550x64720bbc
      wave_funcs45560x647dd640
      winfnt_driver_class45570x6481b980
      x86_2_Decode45580x6467f028
      x86_Convert45590x6467ee24
      zError45600x64765778
      z_errmsg45610x64815460
      zcalloc45620x6476578c
      zcfree45630x647657a0
      zlibCompileFlags45640x64765770
      zlibVersion45650x64765768
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:04:36:41
      Start date:21/10/2024
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\msimg32.dll"
      Imagebase:0x500000
      File size:126'464 bytes
      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:04:36:41
      Start date:21/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6ee680000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:04:36:41
      Start date:21/10/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1
      Imagebase:0xa40000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:04:36:41
      Start date:21/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\msimg32.dll,AlphaBlend
      Imagebase:0xce0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:04:36:41
      Start date:21/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\msimg32.dll",#1
      Imagebase:0xce0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:6
      Start time:04:36:45
      Start date:21/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\msimg32.dll,AppendCaptureDeviceList
      Imagebase:0xce0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:04:36:48
      Start date:21/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\msimg32.dll,AppendDeviceList
      Imagebase:0xce0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:0.1%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:6
        Total number of Limit Nodes:0
        execution_graph 46097 645ec84d 46098 645f4d70 46097->46098 46099 645f617b ExitProcess 46098->46099 46100 645d8555 46101 645d857f VirtualProtect 46100->46101 46103 645d8628 46101->46103

        Control-flow Graph

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$L$L$P$W$W$YR$^S$a$a$a$a$b$b$c$d$d$e$i$i$i$o$o$o$r$r$r$r$r$s$s$t$x$y$y$~]d
        • API String ID: 0-3984222101
        • Opcode ID: 47f6b4bc5ab92c7813d100e51dd825c0d338a5bd54d020660f2f2d47ece8de33
        • Instruction ID: df2f069a39be54bc8376b03479c7c396bc627ff70ff015c5ff2dd006e99073c5
        • Opcode Fuzzy Hash: 47f6b4bc5ab92c7813d100e51dd825c0d338a5bd54d020660f2f2d47ece8de33
        • Instruction Fuzzy Hash: 2F52BDA1E042688AFB24CB28DC94BEAB775EF55304F0040FAD40CA7691E77A5FC58F56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 96 645dc147-645dc348 call 645dc15a call 645dc1e3 call 645dc295 110 645dc34e-645dc804 call 645dc40f 96->110 111 645dcc46-645dcc47 96->111 113 645dd331-645dd630 call 645dd56b 110->113 111->113 125 645dda3a 113->125 126 645dd636-645dd690 113->126 127 645dda44-645ddb57 125->127 132 645dd696-645dd6ce 126->132 133 645dda10-645dda19 126->133 134 645ddb5d-645ddbca call 645ddb85 127->134 135 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 127->135 136 645dd6d1-645dd6f0 132->136 137 645dda25-645dda2c 133->137 134->135 140 645dd6fc-645dd70c 136->140 141 645dd6f2 136->141 137->125 142 645dda2e-645dda38 137->142 140->136 144 645dd70e-645dd742 140->144 146 645dda1b 141->146 142->127 151 645dd850-645dd869 144->151 146->137 154 645dd86b 151->154 155 645dd875-645dd8b6 call 645dd8a3 151->155 154->146 155->146 173 645dd83d-645dd84a 155->173 173->151 174 645dd7b0-645dd7fb 173->174 178 645dd7fd 174->178 179 645dd807-645dd814 174->179 178->146 181 645dd818-645dd831 179->181 182 645dd816 179->182 181->173 184 645dd833 181->184 182->151 184->146
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$L$L$P$W$W$YR$^S$a$a$a$a$b$b$c$d$d$e$i$i$i$o$o$o$r$r$r$r$r$s$s$t$x$y$y$~]d
        • API String ID: 0-3984222101
        • Opcode ID: 879c24533f95b8d724e53b7d44d81c95c7c33131e763fcf2552f372f5a29676d
        • Instruction ID: 269dbd597942f2b66dd67166a935faddbbb146f067bcd5ff109307ec24d1e6f9
        • Opcode Fuzzy Hash: 879c24533f95b8d724e53b7d44d81c95c7c33131e763fcf2552f372f5a29676d
        • Instruction Fuzzy Hash: 3A52BD61E042688AFB24CB28DC94BEAB775EF55304F0041FAD40CA7691E77A5FC58F16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 187 645dc295-645dc348 189 645dc34e-645dc804 call 645dc40f 187->189 190 645dcc46-645dcc47 187->190 192 645dd331-645dd630 call 645dd56b 189->192 190->192 204 645dda3a 192->204 205 645dd636-645dd690 192->205 206 645dda44-645ddb57 204->206 211 645dd696-645dd6ce 205->211 212 645dda10-645dda19 205->212 213 645ddb5d-645ddbca call 645ddb85 206->213 214 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 206->214 215 645dd6d1-645dd6f0 211->215 216 645dda25-645dda2c 212->216 213->214 219 645dd6fc-645dd70c 215->219 220 645dd6f2 215->220 216->204 221 645dda2e-645dda38 216->221 219->215 223 645dd70e-645dd742 219->223 225 645dda1b 220->225 221->206 230 645dd850-645dd869 223->230 225->216 233 645dd86b 230->233 234 645dd875-645dd8b6 call 645dd8a3 230->234 233->225 234->225 252 645dd83d-645dd84a 234->252 252->230 253 645dd7b0-645dd7fb 252->253 257 645dd7fd 253->257 258 645dd807-645dd814 253->258 257->225 260 645dd818-645dd831 258->260 261 645dd816 258->261 260->252 263 645dd833 260->263 261->230 263->225
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$L$L$P$W$W$YR$a$a$a$a$b$b$c$d$d$e$i$i$i$o$o$o$r$r$r$r$r$s$s$t$x$y$y
        • API String ID: 0-254419091
        • Opcode ID: 0fe77eb30240e2316b4f97faae6737ae57d6aff8b5d742bf45017944256340d7
        • Instruction ID: d328a2139b3b5319e022dfed5ee5f178a0d02bca347422cbf6a8e7a99afe3739
        • Opcode Fuzzy Hash: 0fe77eb30240e2316b4f97faae6737ae57d6aff8b5d742bf45017944256340d7
        • Instruction Fuzzy Hash: C742BC61E082688AFB24CB28DC98BDAB775EF55304F0040FAD50CA7291E77A5FC58F16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 266 645dc0b5-645dc348 268 645dc34e-645dc804 call 645dc40f 266->268 269 645dcc46-645dcc47 266->269 271 645dd331-645dd630 call 645dd56b 268->271 269->271 283 645dda3a 271->283 284 645dd636-645dd690 271->284 285 645dda44-645ddb57 283->285 290 645dd696-645dd6ce 284->290 291 645dda10-645dda19 284->291 292 645ddb5d-645ddbca call 645ddb85 285->292 293 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 285->293 294 645dd6d1-645dd6f0 290->294 295 645dda25-645dda2c 291->295 292->293 298 645dd6fc-645dd70c 294->298 299 645dd6f2 294->299 295->283 300 645dda2e-645dda38 295->300 298->294 302 645dd70e-645dd742 298->302 304 645dda1b 299->304 300->285 309 645dd850-645dd869 302->309 304->295 312 645dd86b 309->312 313 645dd875-645dd8b6 call 645dd8a3 309->313 312->304 313->304 331 645dd83d-645dd84a 313->331 331->309 332 645dd7b0-645dd7fb 331->332 336 645dd7fd 332->336 337 645dd807-645dd814 332->337 336->304 339 645dd818-645dd831 337->339 340 645dd816 337->340 339->331 342 645dd833 339->342 340->309 342->304
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$L$L$P$W$W$YR$a$a$a$a$b$b$c$d$d$e$i$i$i$o$o$o$r$r$r$r$r$s$s$t$x$y$y
        • API String ID: 0-254419091
        • Opcode ID: 976fc5251061d57a23bfa5ee00b9821c9c215fc497ba302f54c0bf3618f5c65e
        • Instruction ID: ae85faa66528204c795f0c4e01fc2b1752d220b749ac473e47a2e2f1352ca6be
        • Opcode Fuzzy Hash: 976fc5251061d57a23bfa5ee00b9821c9c215fc497ba302f54c0bf3618f5c65e
        • Instruction Fuzzy Hash: 8842CC61E082688AFB24CB28DC98BDAB775EF55304F0040FAD50CA7291E77A5FC58F16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 345 645dc579-645dd630 call 645dc649 call 645dc65b call 645dd56b 367 645dda3a 345->367 368 645dd636-645dd690 345->368 369 645dda44-645ddb57 367->369 374 645dd696-645dd6ce 368->374 375 645dda10-645dda19 368->375 376 645ddb5d-645ddbca call 645ddb85 369->376 377 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 369->377 378 645dd6d1-645dd6f0 374->378 379 645dda25-645dda2c 375->379 376->377 382 645dd6fc-645dd70c 378->382 383 645dd6f2 378->383 379->367 384 645dda2e-645dda38 379->384 382->378 386 645dd70e-645dd742 382->386 388 645dda1b 383->388 384->369 393 645dd850-645dd869 386->393 388->379 396 645dd86b 393->396 397 645dd875-645dd8b6 call 645dd8a3 393->397 396->388 397->388 415 645dd83d-645dd84a 397->415 415->393 416 645dd7b0-645dd7fb 415->416 420 645dd7fd 416->420 421 645dd807-645dd814 416->421 420->388 423 645dd818-645dd831 421->423 424 645dd816 421->424 423->415 426 645dd833 423->426 424->393 426->388
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: 3@33$E$IODE$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-125561071
        • Opcode ID: bd9563057e12f63972e1073f9ae26f7488d698d4c12bc339b27873998df85fb5
        • Instruction ID: 727aea5d55ac788efed7305464dd4354521ce100bf84bd0e09d34036e9711a91
        • Opcode Fuzzy Hash: bd9563057e12f63972e1073f9ae26f7488d698d4c12bc339b27873998df85fb5
        • Instruction Fuzzy Hash: B942CC71E042688AFB24CB28DC88BEAB775EF55304F1081FAD40CA7691D77A5AC5CF16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 429 645dcc48-645dcc72 call 645dcc5d call 645dcc6e 435 645dccc5-645dd630 call 645dd56b 429->435 436 645dcc74-645dccc4 429->436 449 645dda3a 435->449 450 645dd636-645dd690 435->450 436->435 451 645dda44-645ddb57 449->451 456 645dd696-645dd6ce 450->456 457 645dda10-645dda19 450->457 458 645ddb5d-645ddbca call 645ddb85 451->458 459 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 451->459 460 645dd6d1-645dd6f0 456->460 461 645dda25-645dda2c 457->461 458->459 464 645dd6fc-645dd70c 460->464 465 645dd6f2 460->465 461->449 466 645dda2e-645dda38 461->466 464->460 468 645dd70e-645dd742 464->468 470 645dda1b 465->470 466->451 475 645dd850-645dd869 468->475 470->461 478 645dd86b 475->478 479 645dd875-645dd8b6 call 645dd8a3 475->479 478->470 479->470 497 645dd83d-645dd84a 479->497 497->475 498 645dd7b0-645dd7fb 497->498 502 645dd7fd 498->502 503 645dd807-645dd814 498->503 502->470 505 645dd818-645dd831 503->505 506 645dd816 503->506 505->497 508 645dd833 505->508 506->475 508->470
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0ea1f13ecb28e7ae9258b2ec95b73fd10f0c15b18b4b39499562fdb724735eb2
        • Instruction ID: 5af0a3b6284406140789fbca3795c99f957a6097954fc8511da56f396e04c97d
        • Opcode Fuzzy Hash: 0ea1f13ecb28e7ae9258b2ec95b73fd10f0c15b18b4b39499562fdb724735eb2
        • Instruction Fuzzy Hash: 7B32BBB1E082688AFB24CB28DC98BDAB775EF55304F0041FAD40CA7291D77A5BC58F56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 511 645dc773-645dc77d 512 645dc54e-645dc723 call 645dc649 call 645dc65b 511->512 513 645dc783 511->513 515 645dc78d-645dd630 call 645dd56b 512->515 513->515 533 645dda3a 515->533 534 645dd636-645dd690 515->534 536 645dda44-645ddb57 533->536 542 645dd696-645dd6ce 534->542 543 645dda10-645dda19 534->543 544 645ddb5d-645ddbca call 645ddb85 536->544 545 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 536->545 546 645dd6d1-645dd6f0 542->546 547 645dda25-645dda2c 543->547 544->545 550 645dd6fc-645dd70c 546->550 551 645dd6f2 546->551 547->533 552 645dda2e-645dda38 547->552 550->546 554 645dd70e-645dd742 550->554 556 645dda1b 551->556 552->536 561 645dd850-645dd869 554->561 556->547 564 645dd86b 561->564 565 645dd875-645dd8b6 call 645dd8a3 561->565 564->556 565->556 583 645dd83d-645dd84a 565->583 583->561 584 645dd7b0-645dd7fb 583->584 588 645dd7fd 584->588 589 645dd807-645dd814 584->589 588->556 591 645dd818-645dd831 589->591 592 645dd816 589->592 591->583 594 645dd833 591->594 592->561 594->556
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$IODE$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-276509008
        • Opcode ID: b5571cea624ac53d6687829472b3b40b8f49386cbb59b051c015572b0b22f1df
        • Instruction ID: 72ab2995e83b65ee4bc0d515d0bbe8506ea5600e241ce2513b756170b00fd3b2
        • Opcode Fuzzy Hash: b5571cea624ac53d6687829472b3b40b8f49386cbb59b051c015572b0b22f1df
        • Instruction Fuzzy Hash: D142DD71E042688AFB24CB28DC88BEAB775EF95304F1041FAD40CA7691D77A5AC5CF16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 597 645dc695-645dc6a5 598 645dc6ab-645dc6b8 597->598 599 645dc5aa-645dc680 call 645dc649 call 645dc65b 597->599 601 645dc6ba-645dc6c4 598->601 602 645dc6c6 598->602 605 645dc6dc-645dd630 call 645dd56b 599->605 603 645dc6d0-645dc6d6 601->603 602->603 603->605 622 645dda3a 605->622 623 645dd636-645dd690 605->623 624 645dda44-645ddb57 622->624 629 645dd696-645dd6ce 623->629 630 645dda10-645dda19 623->630 631 645ddb5d-645ddbca call 645ddb85 624->631 632 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 624->632 633 645dd6d1-645dd6f0 629->633 634 645dda25-645dda2c 630->634 631->632 637 645dd6fc-645dd70c 633->637 638 645dd6f2 633->638 634->622 639 645dda2e-645dda38 634->639 637->633 641 645dd70e-645dd742 637->641 643 645dda1b 638->643 639->624 648 645dd850-645dd869 641->648 643->634 651 645dd86b 648->651 652 645dd875-645dd8b6 call 645dd8a3 648->652 651->643 652->643 670 645dd83d-645dd84a 652->670 670->648 671 645dd7b0-645dd7fb 670->671 675 645dd7fd 671->675 676 645dd807-645dd814 671->676 675->643 678 645dd818-645dd831 676->678 679 645dd816 676->679 678->670 681 645dd833 678->681 679->648 681->643
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$IODE$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-276509008
        • Opcode ID: 3ec71e24b61dbbd82df5d0c46b0c19b57f05ccc6d4897f3cdf3d99edc627a0c6
        • Instruction ID: 9cc9a67521f3556c089334cfbd09470a2a2d8266f2d662ae78ae2c4571325fd5
        • Opcode Fuzzy Hash: 3ec71e24b61dbbd82df5d0c46b0c19b57f05ccc6d4897f3cdf3d99edc627a0c6
        • Instruction Fuzzy Hash: D442CB71E042688AFB24CB28DC98BEAB775EF55304F0081FAD40CA7691D77A5AC5CF16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: d42b9712af4b1fc99926e985f71da7defe5d9f8ed09d9d72542de25c62c71cd7
        • Instruction ID: 16b79006267f1c7094da1559ff749179aa33439eca0bdde9ff11aef4b153f752
        • Opcode Fuzzy Hash: d42b9712af4b1fc99926e985f71da7defe5d9f8ed09d9d72542de25c62c71cd7
        • Instruction Fuzzy Hash: 3B52BC71E042688AFB24CB28DC94BEAB775EF95304F1041FAD40CA7290E67A5EC5CF56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 684 645dcd4c 685 645dcd52-645dcdaa call 645dcd74 684->685 689 645dcdae-645dce6f 685->689 690 645dce86-645dce93 689->690 691 645dce71-645dce84 689->691 690->689 692 645dce99-645dcea9 690->692 693 645dcee0-645dcee7 691->693 692->689 696 645dceaf-645dcebc 692->696 694 645dcf29-645dcf75 693->694 695 645dcee9-645dcf27 693->695 700 645dcf87 694->700 701 645dcf77-645dcf81 694->701 697 645dcf91-645dd630 call 645dd56b 695->697 698 645dcebe-645dcec8 696->698 699 645dceca 696->699 713 645dda3a 697->713 714 645dd636-645dd690 697->714 703 645dced4-645dceda 698->703 699->703 700->697 701->685 701->700 703->693 715 645dda44-645ddb57 713->715 720 645dd696-645dd6ce 714->720 721 645dda10-645dda19 714->721 722 645ddb5d-645ddbca call 645ddb85 715->722 723 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 715->723 724 645dd6d1-645dd6f0 720->724 725 645dda25-645dda2c 721->725 722->723 728 645dd6fc-645dd70c 724->728 729 645dd6f2 724->729 725->713 730 645dda2e-645dda38 725->730 728->724 732 645dd70e-645dd742 728->732 734 645dda1b 729->734 730->715 739 645dd850-645dd869 732->739 734->725 742 645dd86b 739->742 743 645dd875-645dd8b6 call 645dd8a3 739->743 742->734 743->734 761 645dd83d-645dd84a 743->761 761->739 762 645dd7b0-645dd7fb 761->762 766 645dd7fd 762->766 767 645dd807-645dd814 762->767 766->734 769 645dd818-645dd831 767->769 770 645dd816 767->770 769->761 772 645dd833 769->772 770->739 772->734
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 3319b205b2b2351be969b68bf7c9597ae05d973c8e14b336f848a6205554034f
        • Instruction ID: eced0e65d3ca787094751c0a92ca2c3edf965daebf30f76f019ff893b81d97da
        • Opcode Fuzzy Hash: 3319b205b2b2351be969b68bf7c9597ae05d973c8e14b336f848a6205554034f
        • Instruction Fuzzy Hash: 6442CC71E042688AFB24CB28DC98BDAB775EF95304F0041FAD40CA7291E67A5EC5CF16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 775 645dcd5c-645dcd5f 776 645dcd60-645dcdaa call 645dcd74 775->776 779 645dcdae-645dce6f 776->779 780 645dce86-645dce93 779->780 781 645dce71-645dce84 779->781 780->779 782 645dce99-645dcea9 780->782 783 645dcee0-645dcee7 781->783 782->779 786 645dceaf-645dcebc 782->786 784 645dcf29-645dcf75 783->784 785 645dcee9-645dcf27 783->785 790 645dcf87 784->790 791 645dcf77-645dcf81 784->791 787 645dcf91-645dd630 call 645dd56b 785->787 788 645dcebe-645dcec8 786->788 789 645dceca 786->789 804 645dda3a 787->804 805 645dd636-645dd690 787->805 793 645dced4-645dceda 788->793 789->793 790->787 791->790 794 645dcd52-645dcd59 791->794 793->783 794->776 806 645dda44-645ddb57 804->806 811 645dd696-645dd6ce 805->811 812 645dda10-645dda19 805->812 813 645ddb5d-645ddbca call 645ddb85 806->813 814 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 806->814 815 645dd6d1-645dd6f0 811->815 816 645dda25-645dda2c 812->816 813->814 819 645dd6fc-645dd70c 815->819 820 645dd6f2 815->820 816->804 821 645dda2e-645dda38 816->821 819->815 823 645dd70e-645dd742 819->823 825 645dda1b 820->825 821->806 830 645dd850-645dd869 823->830 825->816 833 645dd86b 830->833 834 645dd875-645dd8b6 call 645dd8a3 830->834 833->825 834->825 852 645dd83d-645dd84a 834->852 852->830 853 645dd7b0-645dd7fb 852->853 857 645dd7fd 853->857 858 645dd807-645dd814 853->858 857->825 860 645dd818-645dd831 858->860 861 645dd816 858->861 860->852 863 645dd833 860->863 861->830 863->825
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 91e1e9f0f747a8ff5f0fdcce77e680e54f7ef57cadc23f8e8b948480653fd4c9
        • Instruction ID: bdc530de6f89c57a3c4d387b390b7dce731b83eb85a084c3a94af9341df488ce
        • Opcode Fuzzy Hash: 91e1e9f0f747a8ff5f0fdcce77e680e54f7ef57cadc23f8e8b948480653fd4c9
        • Instruction Fuzzy Hash: E642CC71E042688AFB24CB28DC98BDAB775EF95304F0041FAD40CA7291E67A5EC5CF16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 866 645dd0b9-645dd11c 868 645dd319-645dd31f 866->868 869 645dd122-645dd18e 866->869 870 645dd325-645dd630 call 645dd56b 868->870 873 645dd22f-645dd280 869->873 874 645dd194-645dd1a4 869->874 891 645dda3a 870->891 892 645dd636-645dd690 870->892 875 645dd28e-645dd2e5 873->875 876 645dd282-645dd28c 873->876 874->873 877 645dd1aa-645dd1cb call 645dd1cc 874->877 886 645dd2e7-645dd2f1 875->886 887 645dd2f3 875->887 879 645dd2fd-645dd304 876->879 883 645dd314 879->883 884 645dd306-645dd312 879->884 883->868 884->870 886->879 887->879 893 645dda44-645ddb57 891->893 898 645dd696-645dd6ce 892->898 899 645dda10-645dda19 892->899 900 645ddb5d-645ddbca call 645ddb85 893->900 901 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 893->901 902 645dd6d1-645dd6f0 898->902 903 645dda25-645dda2c 899->903 900->901 906 645dd6fc-645dd70c 902->906 907 645dd6f2 902->907 903->891 908 645dda2e-645dda38 903->908 906->902 910 645dd70e-645dd742 906->910 912 645dda1b 907->912 908->893 917 645dd850-645dd869 910->917 912->903 920 645dd86b 917->920 921 645dd875-645dd8b6 call 645dd8a3 917->921 920->912 921->912 939 645dd83d-645dd84a 921->939 939->917 940 645dd7b0-645dd7fb 939->940 944 645dd7fd 940->944 945 645dd807-645dd814 940->945 944->912 947 645dd818-645dd831 945->947 948 645dd816 945->948 947->939 950 645dd833 947->950 948->917 950->912
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: bf7ab73d43efd611ccb85e316f883ae39200c1677546c5c3a846161b881747e9
        • Instruction ID: e6736ef8d4afdcd6f1a2588e3de28bfd722dfb8c008777872257e37ca9843b2d
        • Opcode Fuzzy Hash: bf7ab73d43efd611ccb85e316f883ae39200c1677546c5c3a846161b881747e9
        • Instruction Fuzzy Hash: B3429971E082688AFB24CB28DC94BEAB7B5EF55304F1041EAD40CA7291D77A5EC5CF16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 953 645dd1cc-645dd1fb 954 645dd1fd-645dd21f 953->954 955 645dd221 953->955 954->955 956 645dd228 954->956 959 645dd22f-645dd280 955->959 962 645dd194-645dd1a4 955->962 956->959 960 645dd28e-645dd2e5 959->960 961 645dd282-645dd28c 959->961 968 645dd2e7-645dd2f1 960->968 969 645dd2f3 960->969 963 645dd2fd-645dd304 961->963 962->959 965 645dd1aa-645dd1cb call 645dd1cc 962->965 966 645dd314-645dd31f 963->966 967 645dd306-645dd312 963->967 972 645dd325-645dd630 call 645dd56b 966->972 967->972 968->963 969->963 980 645dda3a 972->980 981 645dd636-645dd690 972->981 982 645dda44-645ddb57 980->982 987 645dd696-645dd6ce 981->987 988 645dda10-645dda19 981->988 989 645ddb5d-645ddbca call 645ddb85 982->989 990 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 982->990 991 645dd6d1-645dd6f0 987->991 992 645dda25-645dda2c 988->992 989->990 995 645dd6fc-645dd70c 991->995 996 645dd6f2 991->996 992->980 997 645dda2e-645dda38 992->997 995->991 999 645dd70e-645dd742 995->999 1001 645dda1b 996->1001 997->982 1006 645dd850-645dd869 999->1006 1001->992 1009 645dd86b 1006->1009 1010 645dd875-645dd8b6 call 645dd8a3 1006->1010 1009->1001 1010->1001 1028 645dd83d-645dd84a 1010->1028 1028->1006 1029 645dd7b0-645dd7fb 1028->1029 1033 645dd7fd 1029->1033 1034 645dd807-645dd814 1029->1034 1033->1001 1036 645dd818-645dd831 1034->1036 1037 645dd816 1034->1037 1036->1028 1039 645dd833 1036->1039 1037->1006 1039->1001
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 7f34ad0c0b0dd4ecc5e3e54d9228ee805e3eee0023805964b6b07774e6ca3a69
        • Instruction ID: 4ac78a3db1e37c6fae5ab60f355e56cf7c37488e5152de50a1046f84f2ff30d4
        • Opcode Fuzzy Hash: 7f34ad0c0b0dd4ecc5e3e54d9228ee805e3eee0023805964b6b07774e6ca3a69
        • Instruction Fuzzy Hash: E032AB71E082688AFB24CB28DC98BEAB775EF55304F1041FAD40CA7291D77A5EC58F16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1042 645dc505-645dd630 call 645dd56b 1054 645dda3a 1042->1054 1055 645dd636-645dd690 1042->1055 1056 645dda44-645ddb57 1054->1056 1061 645dd696-645dd6ce 1055->1061 1062 645dda10-645dda19 1055->1062 1063 645ddb5d-645ddbca call 645ddb85 1056->1063 1064 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 1056->1064 1065 645dd6d1-645dd6f0 1061->1065 1066 645dda25-645dda2c 1062->1066 1063->1064 1069 645dd6fc-645dd70c 1065->1069 1070 645dd6f2 1065->1070 1066->1054 1071 645dda2e-645dda38 1066->1071 1069->1065 1073 645dd70e-645dd742 1069->1073 1075 645dda1b 1070->1075 1071->1056 1080 645dd850-645dd869 1073->1080 1075->1066 1083 645dd86b 1080->1083 1084 645dd875-645dd8b6 call 645dd8a3 1080->1084 1083->1075 1084->1075 1102 645dd83d-645dd84a 1084->1102 1102->1080 1103 645dd7b0-645dd7fb 1102->1103 1107 645dd7fd 1103->1107 1108 645dd807-645dd814 1103->1108 1107->1075 1110 645dd818-645dd831 1108->1110 1111 645dd816 1108->1111 1110->1102 1113 645dd833 1110->1113 1111->1080 1113->1075
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 74e7f2c5464f9401695eb44d60e8af8869c1e22af1dd4ff7d6eafa25fbdf12f4
        • Instruction ID: ee053554936798f67350e290192ffb3250f17a884696c57a694a60169b06bfbf
        • Opcode Fuzzy Hash: 74e7f2c5464f9401695eb44d60e8af8869c1e22af1dd4ff7d6eafa25fbdf12f4
        • Instruction Fuzzy Hash: C122BC71E082688AFB24CA28DC98BDAB775EF55304F0081FAD40CA7291D77A5FC58F56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1116 645dcd37-645dd630 call 645dd56b 1128 645dda3a 1116->1128 1129 645dd636-645dd690 1116->1129 1130 645dda44-645ddb57 1128->1130 1135 645dd696-645dd6ce 1129->1135 1136 645dda10-645dda19 1129->1136 1137 645ddb5d-645ddbca call 645ddb85 1130->1137 1138 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 1130->1138 1139 645dd6d1-645dd6f0 1135->1139 1140 645dda25-645dda2c 1136->1140 1137->1138 1143 645dd6fc-645dd70c 1139->1143 1144 645dd6f2 1139->1144 1140->1128 1145 645dda2e-645dda38 1140->1145 1143->1139 1147 645dd70e-645dd742 1143->1147 1149 645dda1b 1144->1149 1145->1130 1154 645dd850-645dd869 1147->1154 1149->1140 1157 645dd86b 1154->1157 1158 645dd875-645dd8b6 call 645dd8a3 1154->1158 1157->1149 1158->1149 1176 645dd83d-645dd84a 1158->1176 1176->1154 1177 645dd7b0-645dd7fb 1176->1177 1181 645dd7fd 1177->1181 1182 645dd807-645dd814 1177->1182 1181->1149 1184 645dd818-645dd831 1182->1184 1185 645dd816 1182->1185 1184->1176 1187 645dd833 1184->1187 1185->1154 1187->1149
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 8cc1a0d55985d26308d60cbc2783bc9aeed0416cc3f027bc077c105baa8d75bf
        • Instruction ID: 8df3b13a922734a7b52007e019699a3116a17d3e95577f65f18764f883138626
        • Opcode Fuzzy Hash: 8cc1a0d55985d26308d60cbc2783bc9aeed0416cc3f027bc077c105baa8d75bf
        • Instruction Fuzzy Hash: C622B971E082688AFB24CB28DC98BDAB775EF55304F1041FAD40CAB291D77A5BC58F16

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1190 645dcb9a-645dcc03 call 645dcbd8 1195 645dcc05-645dcc41 1190->1195 1196 645dcc46-645dcc47 1190->1196 1197 645dd331-645dd630 call 645dd56b 1195->1197 1196->1197 1203 645dda3a 1197->1203 1204 645dd636-645dd690 1197->1204 1205 645dda44-645ddb57 1203->1205 1210 645dd696-645dd6ce 1204->1210 1211 645dda10-645dda19 1204->1211 1212 645ddb5d-645ddbca call 645ddb85 1205->1212 1213 645f4d70-645f617d call 645f5235 call 645f52ea ExitProcess 1205->1213 1214 645dd6d1-645dd6f0 1210->1214 1215 645dda25-645dda2c 1211->1215 1212->1213 1218 645dd6fc-645dd70c 1214->1218 1219 645dd6f2 1214->1219 1215->1203 1220 645dda2e-645dda38 1215->1220 1218->1214 1222 645dd70e-645dd742 1218->1222 1224 645dda1b 1219->1224 1220->1205 1229 645dd850-645dd869 1222->1229 1224->1215 1232 645dd86b 1229->1232 1233 645dd875-645dd8b6 call 645dd8a3 1229->1233 1232->1224 1233->1224 1251 645dd83d-645dd84a 1233->1251 1251->1229 1252 645dd7b0-645dd7fb 1251->1252 1256 645dd7fd 1252->1256 1257 645dd807-645dd814 1252->1257 1256->1224 1259 645dd818-645dd831 1257->1259 1260 645dd816 1257->1260 1259->1251 1262 645dd833 1259->1262 1260->1229 1262->1224
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: d51e04d47602c6907f6bc2039c6858623209c11f27eb3bf8573f3ccc258636b7
        • Instruction ID: a7b85e071afac64dd5f5d4290b021466083e5ebab3ded13a2fa44ec7bfad3f16
        • Opcode Fuzzy Hash: d51e04d47602c6907f6bc2039c6858623209c11f27eb3bf8573f3ccc258636b7
        • Instruction Fuzzy Hash: E722BAB1E082689AFB24CB28DC98BDAB775EF55304F0041FAD40CA7291D77A5BC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: c1e7137cf711bb9ae0a2fbd7956ff783574d7e1d3ba7e7ef5ebf79d61ef6a5fd
        • Instruction ID: 26f1acd0eac210a0a5e7b367c652da433357192852d171906618964c3f372559
        • Opcode Fuzzy Hash: c1e7137cf711bb9ae0a2fbd7956ff783574d7e1d3ba7e7ef5ebf79d61ef6a5fd
        • Instruction Fuzzy Hash: E622BA71E082688AFB24CA28DC98BDAB775EF55304F0081FAD40CA7291D77A5EC58F56
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 52d1c3332bbf6392e2642dd844f3028a76e485b5d8564b4e15b1c0ec4c24a3b6
        • Instruction ID: ba8fdc8404281e2ae26def3a371f21a9e821d6e3a030ca936fbad254d7df55f7
        • Opcode Fuzzy Hash: 52d1c3332bbf6392e2642dd844f3028a76e485b5d8564b4e15b1c0ec4c24a3b6
        • Instruction Fuzzy Hash: F422A971E082688AFB24CB28DC98BDAB775EF55304F0081FAD40CA7291D77A5BC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 7fe409cb462fe79841b39981d83fcf87530ec206f6df890d7ccb8727030960bb
        • Instruction ID: bb71637a3f5e2e1a65413eb4d85195c347a09e97b9f4957af30d8ed6b9d0203d
        • Opcode Fuzzy Hash: 7fe409cb462fe79841b39981d83fcf87530ec206f6df890d7ccb8727030960bb
        • Instruction Fuzzy Hash: A422A871E182688AFB24CB28DC98BDAB775EF55304F0041EAD40CAB291D77A5FC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: ed9425c2dde8ad84a9d56b083438e96f10ae6884809cecb4ed66661db1a89d8a
        • Instruction ID: bba144055d13c7471d27940f510b3d0e5cbc2c15fe653d1bacb02baf5481ca7c
        • Opcode Fuzzy Hash: ed9425c2dde8ad84a9d56b083438e96f10ae6884809cecb4ed66661db1a89d8a
        • Instruction Fuzzy Hash: 8022A971E082688AFB24CB28DC98BDAB775EF55304F1081EAD40CA7291D77A5FC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: b31949e1a739996ccc2a1283dbaf6bd5df80907bda2c9f76ad91cddf7684fa8a
        • Instruction ID: 57283f4c436dbadb13ecfcb7dcc3e581670bdbc14e8712d7a67caed2516e66d3
        • Opcode Fuzzy Hash: b31949e1a739996ccc2a1283dbaf6bd5df80907bda2c9f76ad91cddf7684fa8a
        • Instruction Fuzzy Hash: B422A871E182688AFB24CB28DC98BDAB775EF55304F0041EAD40CAB291D77A5FC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: e31fcf3387fe01c2bac1b7d3e771678f419a8b61fbb94d59ae2f1f73c17b5f26
        • Instruction ID: 5e49df03d6b7d46f15af2568b7222895c7572752690310cd411fd2828b554d2e
        • Opcode Fuzzy Hash: e31fcf3387fe01c2bac1b7d3e771678f419a8b61fbb94d59ae2f1f73c17b5f26
        • Instruction Fuzzy Hash: A422AA71E182688AFB24CB28DC98BDAB775EF55304F0041FAD40CAB291D77A5BC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 22b417ea5c1c71b10dc9c1b553e00e8a1c1105a1bded556d8c7519421e4af847
        • Instruction ID: c2654edce7f815658c97cfb1187a289f38b65475f85ef0ecdbf5adedfc3cccd7
        • Opcode Fuzzy Hash: 22b417ea5c1c71b10dc9c1b553e00e8a1c1105a1bded556d8c7519421e4af847
        • Instruction Fuzzy Hash: 3D229971E182688AFB24CB28DC98BDAB775EF55304F0041EAD40CA7291D77A5FC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 3cf2ab02110f1070abaeffca59d84ceb434261e707f8460f129a518e3cf1c8b0
        • Instruction ID: fed7a637b12dc3b946950f429b3263000bbc981190348ebae9c2a0c5a96a9128
        • Opcode Fuzzy Hash: 3cf2ab02110f1070abaeffca59d84ceb434261e707f8460f129a518e3cf1c8b0
        • Instruction Fuzzy Hash: 30229971E182688AFB24CB28DC98BDAB775EF55304F0041EAD40CA7291D77A5FC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$YR$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-3181954315
        • Opcode ID: 879047cfc4591317f3c19dbf23ae36618bb3532fbe900d323b37235ef734e58a
        • Instruction ID: f5bfac02a1ebd19feab979383608edfe5b238830536a9ea39e4a6c636b7ddb69
        • Opcode Fuzzy Hash: 879047cfc4591317f3c19dbf23ae36618bb3532fbe900d323b37235ef734e58a
        • Instruction Fuzzy Hash: 8D22A971E182688AFB24CB28DC98BDAB775EF55304F0081EAD40CA7291D77A5FC58F16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: d5b21cd91310ec686f862ff2fd6a04e9c951da63967b00cc4bb8ee4609fc9fa4
        • Instruction ID: cb859dbe298792cc602fb052884df2143f4160b3cb93f66b520dc4787e33b8cf
        • Opcode Fuzzy Hash: d5b21cd91310ec686f862ff2fd6a04e9c951da63967b00cc4bb8ee4609fc9fa4
        • Instruction Fuzzy Hash: 40E1D2B1D482689EFB24CA28DC98BDABBB5EF51304F0441FAD40CA6281D7795BC5CF52
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 3fa91d91cd9cc52aa438b76155d5e0f06575a4ed24fe4abdd860776930165f6a
        • Instruction ID: e5050ac277913ffdb7e2f640889db0165276d8119d6b9b3452278cfc3c1b4bd4
        • Opcode Fuzzy Hash: 3fa91d91cd9cc52aa438b76155d5e0f06575a4ed24fe4abdd860776930165f6a
        • Instruction Fuzzy Hash: CFE1C1B1D482689AFB24CB28DC98BDABBB5EF51304F0441FAD40CA6281D7795BC5CF52
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 9a2473676d914fa1f29a1e3ac7f2b562cbd3419c6f787efa98cc1b298503bdcd
        • Instruction ID: 217425ed5e9551cbe541d2c69130ab9ff887f2d4e928454502a9c2f91cf0c317
        • Opcode Fuzzy Hash: 9a2473676d914fa1f29a1e3ac7f2b562cbd3419c6f787efa98cc1b298503bdcd
        • Instruction Fuzzy Hash: 6DE1F2B1D482689AF724CB28DC98BDA7BB5EF51304F0441FAD40CA6281D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 07ab6a9c335498ad40e543930ed880df281ca107366a4f7f35a412bf7c133edf
        • Instruction ID: 6e4fd7528d106110a74dbb0bf68219309ca3b0e3919073d9ce9a67bd689ee2e1
        • Opcode Fuzzy Hash: 07ab6a9c335498ad40e543930ed880df281ca107366a4f7f35a412bf7c133edf
        • Instruction Fuzzy Hash: ACE1F4B1E482689EF724CB28DC94BDABBB5EF51304F0440FAD44866281D77A5BC5CF16
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: d34bac0e2c15a2fcb6234040fceb175b717d221a323f5a77d947f21b5c82ba9e
        • Instruction ID: aa47ded6723339e50e696ffae5a1049c9e0d1823007444016a4750e6066cec7e
        • Opcode Fuzzy Hash: d34bac0e2c15a2fcb6234040fceb175b717d221a323f5a77d947f21b5c82ba9e
        • Instruction Fuzzy Hash: 76D1E3B1D482689AF724CA28DC98BDB7BB5EF51304F0441F9D40C96281D77A5BC9CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 9e89f973fecd2c1bfff85378c0215b29f06031abe6b477291fd95432e783a8de
        • Instruction ID: d3efcedb5a6809a2d4fb9f2247b8380e8562f576b8abfbd5bb26da872f9f1d5a
        • Opcode Fuzzy Hash: 9e89f973fecd2c1bfff85378c0215b29f06031abe6b477291fd95432e783a8de
        • Instruction Fuzzy Hash: 29D1F2B1D482588AF724CA28DC98BDB7BB5EF51314F0441F9D40C96281D77A5BC9CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: b92e64a3a0a55250e591a7ffda3ece178d191c1fdb73b9608a51b3e356b7a7ff
        • Instruction ID: 5b1a3b7538ad282a48e33445786c8d545ab2b75e7992e9b20cc7f35a1fdeca5a
        • Opcode Fuzzy Hash: b92e64a3a0a55250e591a7ffda3ece178d191c1fdb73b9608a51b3e356b7a7ff
        • Instruction Fuzzy Hash: 23D1E471D482588AF724CA28DC98BDB7BB5EF51304F0441F9D44C96282D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 5ccf615543054cc5d63a7473b70be87ae620c4797fdc94608e4cd8144f17ee3e
        • Instruction ID: ca694a85b7676fdb8d48685cc71c63e07d664a862ee0364bab7fed4a246f6220
        • Opcode Fuzzy Hash: 5ccf615543054cc5d63a7473b70be87ae620c4797fdc94608e4cd8144f17ee3e
        • Instruction Fuzzy Hash: 9DD1F471D482688AF724CB28DC98BDA7BB5EF51308F0441FAD44CA6281D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 574cf5199c69b3aaecec09374c28b93b9184bc850284faaf993638f4f44a3adc
        • Instruction ID: 9f3feb5a05b03c9625e94d761bcb9b2246e90caf114f1462ce4a5e65331658cd
        • Opcode Fuzzy Hash: 574cf5199c69b3aaecec09374c28b93b9184bc850284faaf993638f4f44a3adc
        • Instruction Fuzzy Hash: 7AD11571D482688AF724CB28DC98BDA7BB5EF51308F0441FAD44CA6281D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 2952912c33ec8f49a54be1cb196be22913b4a448c7aea49b2bb64023abfe74ce
        • Instruction ID: bc0ae06d0c09246b66e7461a0738aef0526fd6b6eba8eb5448b418e6fa197b68
        • Opcode Fuzzy Hash: 2952912c33ec8f49a54be1cb196be22913b4a448c7aea49b2bb64023abfe74ce
        • Instruction Fuzzy Hash: A4C1E271D482688AF724CA28DC98BDA7BB5EF51308F0441FAD40CA6281D77E5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: f886792f4192bfb5fbc359eeaad1b63ad0497c8eb93376b42d6b8a3fcabdfdff
        • Instruction ID: 56c183d9d3747aa25dc67e4bb09b476b2b085c78f1468c6596dc2e48626445fe
        • Opcode Fuzzy Hash: f886792f4192bfb5fbc359eeaad1b63ad0497c8eb93376b42d6b8a3fcabdfdff
        • Instruction Fuzzy Hash: 23C1D371D482688AF724CA28DC98BDA7BB5EF51308F0441FAD44C66281D77A5FC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 03ec7ec7a615d70be1646840b748d99bf925f32d742d1826c3e2e928416ec882
        • Instruction ID: c7a786a15678b7c19f238556ed1580708a7aba4fb3d45b03d610792d0ec45fb7
        • Opcode Fuzzy Hash: 03ec7ec7a615d70be1646840b748d99bf925f32d742d1826c3e2e928416ec882
        • Instruction Fuzzy Hash: 2EC1D471D482A88AF724CA28DC98BDA7BB5EF51308F0441F9C44C66281D77A5BC5CF62
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: f1ac2bda0ba195055c4c68640282637ce9c1cd6c3c980edbdf3177193350732b
        • Instruction ID: 954878ced6f85af0aac8f486c577d284134af06c152537f43c686cd6f3970152
        • Opcode Fuzzy Hash: f1ac2bda0ba195055c4c68640282637ce9c1cd6c3c980edbdf3177193350732b
        • Instruction Fuzzy Hash: D0D19AB1E041698FEB24DA18CC94AEABBB5FF85304F1441EAD84DA7241D7749EC2CF91
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: f4b9ea8f9e43f4e9f75ca1279c09720b8a9f7bf4fbecd5a233cbcb576f6f056e
        • Instruction ID: 5a519244418fff3787a04bda3f2c23c46de85c9dbac961aedeb1945fc7e39afb
        • Opcode Fuzzy Hash: f4b9ea8f9e43f4e9f75ca1279c09720b8a9f7bf4fbecd5a233cbcb576f6f056e
        • Instruction Fuzzy Hash: 0451F3B2D042659BF7209A28DC44AEBBB78EF81314F1541FAD84D97281D7385EC6CE92
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 44a8597a7b9e7f84c72de9b52854abe7bb7fc4c7d095caafcfc83792481d2e97
        • Instruction ID: 8370fdc16a384684c6c6deedd8d6b3a8f486d41a49509c51507437f2df79e34a
        • Opcode Fuzzy Hash: 44a8597a7b9e7f84c72de9b52854abe7bb7fc4c7d095caafcfc83792481d2e97
        • Instruction Fuzzy Hash: 1FD1F4B1D482689AF724CA28DC98BDA7BB4EF51304F0441FAD40CA6281D77E5BC5CF22
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 25893981e267dc79eaa26bbe2985f8ce7819c7e77ef3f749bf1ff59015017c52
        • Instruction ID: 8ffe73888f50d3866a2c2deeb9a5006ea5f632ac3eaebb26c61bd927c8878479
        • Opcode Fuzzy Hash: 25893981e267dc79eaa26bbe2985f8ce7819c7e77ef3f749bf1ff59015017c52
        • Instruction Fuzzy Hash: A7D1D371D482688AF724CA28DC98BDA7BB5EF51304F0441F9D40DA6281D77E5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 4fc2c8762cbbbca0639737643eebde7a518b7482baf0aa7a00f92cfc2762dcab
        • Instruction ID: 1eb9939349e71ad20074dec82a5322de0a3a60c85e612f36ea1aa7377fae4547
        • Opcode Fuzzy Hash: 4fc2c8762cbbbca0639737643eebde7a518b7482baf0aa7a00f92cfc2762dcab
        • Instruction Fuzzy Hash: EFC1D371D482A88AF724CB28DC98BDA7BB5EF51308F0441F9D44CA6281D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: acc130cb89f68326730aa166797e0d10515e812d4578496e6303a5664a3b6f55
        • Instruction ID: 6a7a04f36d0562395c970ee233689450e5d0c6c88bb65e57c41ee984b80a08be
        • Opcode Fuzzy Hash: acc130cb89f68326730aa166797e0d10515e812d4578496e6303a5664a3b6f55
        • Instruction Fuzzy Hash: 89C1D471D482A88AF724CA28DC98FDA7BB5EF51308F0441F9D44C66282D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: dc89991482d0b1adccdeaa70c0f0c8b1a5f2a8f966ba5788d5a86e50c4c1c87c
        • Instruction ID: 6a7a04f36d0562395c970ee233689450e5d0c6c88bb65e57c41ee984b80a08be
        • Opcode Fuzzy Hash: dc89991482d0b1adccdeaa70c0f0c8b1a5f2a8f966ba5788d5a86e50c4c1c87c
        • Instruction Fuzzy Hash: 89C1D471D482A88AF724CA28DC98FDA7BB5EF51308F0441F9D44C66282D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 12f6a62fa0f649d1349e53db1769fdac417d4c58bb41c58451e7e952403ccd8d
        • Instruction ID: 6a7a04f36d0562395c970ee233689450e5d0c6c88bb65e57c41ee984b80a08be
        • Opcode Fuzzy Hash: 12f6a62fa0f649d1349e53db1769fdac417d4c58bb41c58451e7e952403ccd8d
        • Instruction Fuzzy Hash: 89C1D471D482A88AF724CA28DC98FDA7BB5EF51308F0441F9D44C66282D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 6e0ae04e5a7a31a6545d72c64cb55be97ab6ab83c185959e6519e4fcc21a0bfb
        • Instruction ID: 6a7a04f36d0562395c970ee233689450e5d0c6c88bb65e57c41ee984b80a08be
        • Opcode Fuzzy Hash: 6e0ae04e5a7a31a6545d72c64cb55be97ab6ab83c185959e6519e4fcc21a0bfb
        • Instruction Fuzzy Hash: 89C1D471D482A88AF724CA28DC98FDA7BB5EF51308F0441F9D44C66282D77A5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: b21c57195eaf893541b455ae6450f60d65da35f129aeb0bddec1a7ed2a38c87c
        • Instruction ID: 78b9d1be66af38e055f90a49de26dc15b6abffc114b101d2a08d5de2fce47685
        • Opcode Fuzzy Hash: b21c57195eaf893541b455ae6450f60d65da35f129aeb0bddec1a7ed2a38c87c
        • Instruction Fuzzy Hash: 20C1D471D482A88AF724CA28DC98BDA7BB5EF51308F0441F9C44D66282D77E5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 9fab31fd5cc19ed9fff2c7663954c92eb1ac418fbf555f2224a791a87a2ab61c
        • Instruction ID: 78b9d1be66af38e055f90a49de26dc15b6abffc114b101d2a08d5de2fce47685
        • Opcode Fuzzy Hash: 9fab31fd5cc19ed9fff2c7663954c92eb1ac418fbf555f2224a791a87a2ab61c
        • Instruction Fuzzy Hash: 20C1D471D482A88AF724CA28DC98BDA7BB5EF51308F0441F9C44D66282D77E5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 44f076d20cd11aeb76d230f8ffb23da5bfeab51fffd7c45f80d5c7ecd5ca472b
        • Instruction ID: 78b9d1be66af38e055f90a49de26dc15b6abffc114b101d2a08d5de2fce47685
        • Opcode Fuzzy Hash: 44f076d20cd11aeb76d230f8ffb23da5bfeab51fffd7c45f80d5c7ecd5ca472b
        • Instruction Fuzzy Hash: 20C1D471D482A88AF724CA28DC98BDA7BB5EF51308F0441F9C44D66282D77E5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: e76e2bea61f5b89e9ab821aacc163c3eb1027d34404ae4c9dc47b98b921006fd
        • Instruction ID: 78b9d1be66af38e055f90a49de26dc15b6abffc114b101d2a08d5de2fce47685
        • Opcode Fuzzy Hash: e76e2bea61f5b89e9ab821aacc163c3eb1027d34404ae4c9dc47b98b921006fd
        • Instruction Fuzzy Hash: 20C1D471D482A88AF724CA28DC98BDA7BB5EF51308F0441F9C44D66282D77E5BC5CF62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 0-215400123
        • Opcode ID: 7a457b2db29c83e382ec41893625cc988b0f9d8b519e55848c46cd642baf7169
        • Instruction ID: 60c3e275dd0a543559d4a64fc53872e14cef2cf64024a076c522d84a7b52839a
        • Opcode Fuzzy Hash: 7a457b2db29c83e382ec41893625cc988b0f9d8b519e55848c46cd642baf7169
        • Instruction Fuzzy Hash: C7A1D371D482A88EF764CA28DC98BDA7BB5EF51308F0441F9C44C96282D77A5FC58F62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ExitProcess
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 621844428-215400123
        • Opcode ID: 89365db0fac53e72b9749426d3475e145a8b08176ea4a9d352e9758925a8b5ec
        • Instruction ID: a570174a80e308fd2801cadfbe8dcdc2db43d1a0581f11702359f157a0a5ba86
        • Opcode Fuzzy Hash: 89365db0fac53e72b9749426d3475e145a8b08176ea4a9d352e9758925a8b5ec
        • Instruction Fuzzy Hash: 5F81F561D482A88AF760C628DC58BDA7BB5EF11308F0445F9C54C57282D77E5FC58F62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ExitProcess
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 621844428-215400123
        • Opcode ID: 6f7cba1156a5c64a46d0b69240c9faef46dcf80a06ace5333d1287e4d70c5345
        • Instruction ID: 413c8ec7b07b50bfb92d060794c4b1162bdebfd481fb4213034ed40b8acc7fbc
        • Opcode Fuzzy Hash: 6f7cba1156a5c64a46d0b69240c9faef46dcf80a06ace5333d1287e4d70c5345
        • Instruction Fuzzy Hash: 2981D261D492A88AFB60CA28DC58BDA7BB5EB11308F0444F9C54C67282D77E5FC58F62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ExitProcess
        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
        • API String ID: 621844428-215400123
        • Opcode ID: 1758f0670723a33093edca0a1a90b63a7977debf9e9204559475201af98905ee
        • Instruction ID: 68c65db06a4b0b5b75e3eec9c370abce550a49c709f2d934c326a74fb5c27471
        • Opcode Fuzzy Hash: 1758f0670723a33093edca0a1a90b63a7977debf9e9204559475201af98905ee
        • Instruction Fuzzy Hash: 9181E361D492A8CAFB64CA28DC58BDA7BB5EB11308F0440F9C54C67282D77E5FC58F62
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: <LI2
        • API String ID: 544645111-190138733
        • Opcode ID: fcfaf93ba43542e9b13291d145d0327e74b361cdfa6dd7f58e887b12a2089fa1
        • Instruction ID: 249bd2ecfc4c9e0246306ada19e08e2394455d03d21662037277e53ff6294f8d
        • Opcode Fuzzy Hash: fcfaf93ba43542e9b13291d145d0327e74b361cdfa6dd7f58e887b12a2089fa1
        • Instruction Fuzzy Hash: EE51CEB2D105659FEB248B18DC55AEAB779EF84300F1494FAD80DA7280DA785EC1CF91
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7dbcda267e235da5493f9c2f2f7af25782a08067f001b81b4148866202872851
        • Instruction ID: 20ae67acb4c908a7facb9901fbde2e70f9bbbe3452cb5635e5acfc423ffaccaf
        • Opcode Fuzzy Hash: 7dbcda267e235da5493f9c2f2f7af25782a08067f001b81b4148866202872851
        • Instruction Fuzzy Hash: 0A4103B2D041669BE7208B68DC54AFFB7B8EF81314F1455FAD84CA7281D6384EC5CB92
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: CM;I
        • API String ID: 0-3809812560
        • Opcode ID: ed79147b7551f7de9b626f30c0ac7a4f33f85e501fe858478f0355a6d6fdf3fa
        • Instruction ID: 0e39aa127da28684d2c815ca3f10ec2625eaf977a835e52bd279bc1e5e5a13c9
        • Opcode Fuzzy Hash: ed79147b7551f7de9b626f30c0ac7a4f33f85e501fe858478f0355a6d6fdf3fa
        • Instruction Fuzzy Hash: 4F4126B2D041659FE7248A6CDC44AEBBBB8EF85310F0555FAD84CA7281D6384EC5CF92
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: 8P7X
        • API String ID: 544645111-2379241488
        • Opcode ID: 148d220bec110594a1ed96adb7047c82e1be633ec37061732a636a38df11d05b
        • Instruction ID: ed1a28ffdc455523349e2265de84842c08cf92cdcace1643dc8d4fb8720f3670
        • Opcode Fuzzy Hash: 148d220bec110594a1ed96adb7047c82e1be633ec37061732a636a38df11d05b
        • Instruction Fuzzy Hash: 2C31E2B2E141269FF7248A18DC44AEBB779EF84314F1054FAD84CA7280D6385EC6CF92
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: :J8:
        • API String ID: 544645111-307014278
        • Opcode ID: d8fce04861fa2efe80094b485c9e18e8388a5ea0fc71876e049cf195f916f707
        • Instruction ID: 78bfa535850a80306f1550e536e3dc5dd4bc4bb86c46b6a8f320cd481be61a33
        • Opcode Fuzzy Hash: d8fce04861fa2efe80094b485c9e18e8388a5ea0fc71876e049cf195f916f707
        • Instruction Fuzzy Hash: DC1159B3E056656AF310866CDD84ADFBB7CDB85314F1505B6E80CE3141D63C5FC58A92
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: df3147b1024b01f65b4c2605f42df542eb3b75e934e800704e2f3d9e48b8db72
        • Instruction ID: 758d826630bd496239123374901e3239beba46239519749c301f61c01c96ec42
        • Opcode Fuzzy Hash: df3147b1024b01f65b4c2605f42df542eb3b75e934e800704e2f3d9e48b8db72
        • Instruction Fuzzy Hash: DF5116B2E046A95FE7119A28DD94AEEB778FF82304F1405FBD80D96181C6385EC28A52
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 2560165bc0bfbb087b8409baceae59ed5600e3189c282fb357cbee7f1a4a43c2
        • Instruction ID: d7f80eeb0fecfb40f14229273e93864f1efef1edfde1022edc951e4acb4ef5b9
        • Opcode Fuzzy Hash: 2560165bc0bfbb087b8409baceae59ed5600e3189c282fb357cbee7f1a4a43c2
        • Instruction Fuzzy Hash: 865101B19045A89BE714CA18DDA0BEE7BB5BF41309F1485FBC82DA6140D7385FC18F42
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: ab0615b1a9a1bbb209b1fd675f81be3f0871adc7dd7868cb08814222907ec600
        • Instruction ID: 26fbb0c34ae6b7ad1dcaf7ed1151ca9280d42e7362f47fc1e7c7f214fcff0502
        • Opcode Fuzzy Hash: ab0615b1a9a1bbb209b1fd675f81be3f0871adc7dd7868cb08814222907ec600
        • Instruction Fuzzy Hash: AF51F0B2D141259AEB208F28DC44AEBB778EF84310F0451FAD84CA7280DA384EC5CF92
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 2c85aee6313e95379d4da13be0fdd3f54e5aee923143d24acc83fdd02d853624
        • Instruction ID: cef686a0b46c10533e98be6436a40d3664818ae04c877817d3eb935e1f59f725
        • Opcode Fuzzy Hash: 2c85aee6313e95379d4da13be0fdd3f54e5aee923143d24acc83fdd02d853624
        • Instruction Fuzzy Hash: 174129B2E055689FF7108A28DC54AEBB778EF85304F1401FAD44C97241D7385EC6CB92
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: aa6a98c4cb6d398f6f9746e4dbd4775891006fb56202bce95d1b9b7dde5890ad
        • Instruction ID: f29d6dfc0b4d8db2c3afe758ea0acfe7ffa28ae6399620636e6b801ac44189ee
        • Opcode Fuzzy Hash: aa6a98c4cb6d398f6f9746e4dbd4775891006fb56202bce95d1b9b7dde5890ad
        • Instruction Fuzzy Hash: AC3147B2E042656BF3109668DC88DEFB77CEFC1304F1805BAD80D97141D6395EC6CAA2
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 0435bea631c40379a9b7316314cb62d5400dc64d4f4c366f0e84e8e8396b4e62
        • Instruction ID: 0616cd3107ce368519ac86f0c680fea96823d8c186f208d2149cd00f507153a7
        • Opcode Fuzzy Hash: 0435bea631c40379a9b7316314cb62d5400dc64d4f4c366f0e84e8e8396b4e62
        • Instruction Fuzzy Hash: A131F0B2D541259FF7248A28DC55AEB7778EF80314F0154FAD84CA7280D7785EC68E92
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 66a1c86db34cf96c09d21d6413e79b9f6f8ae21d5c0e2e5e80d7be83e03cb6df
        • Instruction ID: 76a51cee99cb4e6b72857fa73f3261472d273a647cc1133765fd7ea97368ebec
        • Opcode Fuzzy Hash: 66a1c86db34cf96c09d21d6413e79b9f6f8ae21d5c0e2e5e80d7be83e03cb6df
        • Instruction Fuzzy Hash: 0F31F3B2D142659BF7208A28DC54AEB7778EF84314F0454FAD84CA7281D6384EC5CE92
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 80b1e9d918721f8eb8fa78c35a58db48ccafdda6d79b19356b488a63b76c741e
        • Instruction ID: a1898bc05438e69041aa7498a73011b5ed8fa43c464bd79bdc10c9bf0243e3a0
        • Opcode Fuzzy Hash: 80b1e9d918721f8eb8fa78c35a58db48ccafdda6d79b19356b488a63b76c741e
        • Instruction Fuzzy Hash: 5131E1B2E142259BF7208A18DC44AEBB779EF84314F0554FAD85CA7280D7385EC5CE92
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 3f55b1f40636b35bdc1e159b6670f8b5c0e7f84003e6e3cea6ec88776888abd2
        • Instruction ID: cabe58a2151ba8283f300c6d9f316e0877f05e0b4bb2b5689d26d1305de301d9
        • Opcode Fuzzy Hash: 3f55b1f40636b35bdc1e159b6670f8b5c0e7f84003e6e3cea6ec88776888abd2
        • Instruction Fuzzy Hash: 0821F1B2D142269FFB248A18CC54AEAB778EB84315F1054FAD84CA7281DB385EC1CF51
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 91c7a058c01e42941ab83db50d018aaff26257f7e7ec093986076b512d7563bd
        • Instruction ID: 856fc8089fad084559546a1fe5ae5006e277215d5c110b29f487fd739837d392
        • Opcode Fuzzy Hash: 91c7a058c01e42941ab83db50d018aaff26257f7e7ec093986076b512d7563bd
        • Instruction Fuzzy Hash: A22137B2E045A96BE724CA18DC90AEF7779AF81315F1059FAD46CE6180C7384FC18E51
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: c0ec43a11bfc36a9ac8b3306c56bf7e0dd36b036c532a501405443d92a34a2d0
        • Instruction ID: 3b48ebfbed761cb7a883ee167091a01d6753b787491055104eb26b342a117a03
        • Opcode Fuzzy Hash: c0ec43a11bfc36a9ac8b3306c56bf7e0dd36b036c532a501405443d92a34a2d0
        • Instruction Fuzzy Hash: 0521FFB2D041A9AFE720CA08DD90BEF77B8AB84304F1045FAD85DA6240DA385EC18E51
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 1d7a7c0c894fa811a198634e8fe5b04ac345c3b73864352f5d67ef6c6da3c0e8
        • Instruction ID: 648f5bebd48e11d134796a52ec6df99b01826242987dc28fd8a883122b90ec18
        • Opcode Fuzzy Hash: 1d7a7c0c894fa811a198634e8fe5b04ac345c3b73864352f5d67ef6c6da3c0e8
        • Instruction Fuzzy Hash: 001136B1E045A99BEB24CA18DC90AEF7778AF85305F1055FAD46CA7180C7381EC1CF41
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 756476c9cbbf495627d2e295b0ae2ea43d7711b038c99ffa3d27b1d0b9de3e49
        • Instruction ID: 97904ece0550017022373fc34687adea80cdd10dd9ae93cb5640fa90ed21126f
        • Opcode Fuzzy Hash: 756476c9cbbf495627d2e295b0ae2ea43d7711b038c99ffa3d27b1d0b9de3e49
        • Instruction Fuzzy Hash: D8114CB2D041556FE3109668DD54AEF7778EF84304F1405BAE40C97041CB385AC58A92
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 970114d5314431691f347de658544521aa0cb7889f698bf49656186d074a27a5
        • Instruction ID: ac6d77496cbf07680cbab55fd5998474464ba9b2643fd71a86aa3aa388f43326
        • Opcode Fuzzy Hash: 970114d5314431691f347de658544521aa0cb7889f698bf49656186d074a27a5
        • Instruction Fuzzy Hash: E90126A3E144266AF310855CED84BEF766DDBC4318F1545B6E91CE7040CA3C4EC28AA2
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 4beb70950c69b536084da9ce32e89506686041f8e41172c272588c28d5be7d88
        • Instruction ID: a018570867488de92a27b5a4b5e60a2fc451ec219fa3cebc0e339a00b1b7319d
        • Opcode Fuzzy Hash: 4beb70950c69b536084da9ce32e89506686041f8e41172c272588c28d5be7d88
        • Instruction Fuzzy Hash: 870124B2E00169AFE724CA58DD40AEF7738EB84304F1014F9E45CA3240DB385EC18E91
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 7cbb3205fc1acdfe75843381df5ab31ac420dd0df5531d899ba29ed72d3df17f
        • Instruction ID: a7a9cc789de584a8c6437fab068b4bc2473e602e4ef2a6fb157a079aab25f66a
        • Opcode Fuzzy Hash: 7cbb3205fc1acdfe75843381df5ab31ac420dd0df5531d899ba29ed72d3df17f
        • Instruction Fuzzy Hash: 6401D4B2E04169AFE720CA58DD40AEF7778EB84314F1555F9E45CA7240DB385EC18EA1
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,645D81E7,?,?,?,?,?,?,?,?,?,?,00000000), ref: 645D861E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 761c467e506c3d66c57d55c4051a57492d4ae7125ae7d8f0cae13dfcd9b22685
        • Instruction ID: ae58037a1ef9de357738f1e3f78551bc99449c5029e623a06b6a48e9497cd1ed
        • Opcode Fuzzy Hash: 761c467e506c3d66c57d55c4051a57492d4ae7125ae7d8f0cae13dfcd9b22685
        • Instruction Fuzzy Hash: AC0124B2E00169AFE720CA58DD40AEF7738EB84304F1055F9E45CA3240DB385EC18E91
        APIs
        • __PHYSFS_platformInit.MSIMG32 ref: 646814BD
        • __PHYSFS_platformCreateMutex.MSIMG32 ref: 646814CA
        • __PHYSFS_platformCreateMutex.MSIMG32 ref: 646814DC
        • __PHYSFS_platformCalcBaseDir.MSIMG32 ref: 646814F5
        • __PHYSFS_platformRealPath.MSIMG32 ref: 6468150A
        • __PHYSFS_platformGetUserDir.MSIMG32 ref: 6468156A
        • __PHYSFS_platformRealPath.MSIMG32 ref: 6468157C
        • __PHYSFS_platformGrabMutex.MSIMG32 ref: 646815ED
        • __PHYSFS_platformGetThreadID.MSIMG32 ref: 646815FF
        • __PHYSFS_platformSetDefaultAllocator.MSIMG32 ref: 646816D3
        • __PHYSFS_setError.MSIMG32 ref: 6468171F
        • __PHYSFS_platformReleaseMutex.MSIMG32 ref: 646818BC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: S_platform$Mutex$CreatePathReal$AllocatorBaseCalcDefaultErrorGrabInitReleaseS_setThreadUser
        • String ID: %susers%s%s$Already initialized$Invalid argument$Out of memory$argv0 is NULL$ctSound8$default$irectSoundCapture
        • API String ID: 973777366-2150709888
        • Opcode ID: fdb4ac3336be18cde5b4ca0b9f5c88f1ee8fb9500870aee5f3ee62a15e618d13
        • Instruction ID: 20d3578f1ff358a18e868d9295c16047bcddcfeef9eedf9ccb6ae49a2263859b
        • Opcode Fuzzy Hash: fdb4ac3336be18cde5b4ca0b9f5c88f1ee8fb9500870aee5f3ee62a15e618d13
        • Instruction Fuzzy Hash: 61C15CB46583158FEB009F79C59825EBBE4FF55358F01892DE8A4D7380EB74D881CBA2
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$L$L$M$N$W$W$XS$a$a$a$b$d$d$e$e$e$e$i$i$l$l$m$o$o$r$r$t$u$y
        • API String ID: 0-2426704164
        • Opcode ID: ddd1097e119fc2dcd3ca8a6fba4a18a32c21926d8bdb0251ae2540255b71580c
        • Instruction ID: 3316eb97deaa466aaf242cad6c9a2ffcf62d621ad96facd0fbecb52f2ea2af05
        • Opcode Fuzzy Hash: ddd1097e119fc2dcd3ca8a6fba4a18a32c21926d8bdb0251ae2540255b71580c
        • Instruction Fuzzy Hash: 69420531E286A986DB28CB39DC516DFB6B2EF58300F0494FDD50DE7250E7B44A858F1A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$L$L$M$N$W$W$XS$a$a$a$b$d$d$e$e$e$e$i$i$l$l$m$o$o$r$r$t$u$y
        • API String ID: 0-2426704164
        • Opcode ID: 185ddee043cfd147c7f70a270a2f8bbf3c189f40dc01b17d1dccd37047205952
        • Instruction ID: 37366b7b2caf72b6f9e6d6b131fe8632e6a63f879d1bdef34f878b09c046708a
        • Opcode Fuzzy Hash: 185ddee043cfd147c7f70a270a2f8bbf3c189f40dc01b17d1dccd37047205952
        • Instruction Fuzzy Hash: 2732F535A286A886DB28CB39DC116DFB6B3EF59300F0494FD950DE7250E7B44A858B1A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$L$L$M$N$W$W$XS$a$a$a$b$d$d$e$e$e$e$i$i$l$l$m$o$o$r$r$t$u$y
        • API String ID: 0-2426704164
        • Opcode ID: eaeac23f253199cb75b33416572f50730be65b50d47701170897c6742f6cfc62
        • Instruction ID: e470da9bc3119697cd2849ae82151196c0eecca058b43aebd7d3a05cf1bba69e
        • Opcode Fuzzy Hash: eaeac23f253199cb75b33416572f50730be65b50d47701170897c6742f6cfc62
        • Instruction Fuzzy Hash: E932E535E2869886DB28CB39DC116DFB6B3EF59300F04D4FD950DE7260E7B44A858B1A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: L$L$L$L$L26B$P$Q$S$W$W$X$a$a$a$a$b$b$d$d$i$i$o$o$r$r$r$r$y$y
        • API String ID: 0-1254823171
        • Opcode ID: 773658ae9cfdec7883e4c92e9d1c1cac2900bada75cbf72fe43656fb695a2548
        • Instruction ID: 0f1dcc075f5879b44159abed6d80742a50dc893d7b2a9d7f323ccef467aaa11f
        • Opcode Fuzzy Hash: 773658ae9cfdec7883e4c92e9d1c1cac2900bada75cbf72fe43656fb695a2548
        • Instruction Fuzzy Hash: 1302F3B1E186A88AE724CB24DC547EA7B75EF52310F0440F9D54DA7681E3B94FC1CB62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: L$L$L$L$L26B$P$W$W$X$a$a$a$a$b$b$d$d$i$i$o$o$r$r$r$r$y$y
        • API String ID: 0-3736276490
        • Opcode ID: 52b51ec6a886e140a43fa1546eccafd0aa2afeb93e4570272d2029de4e32a98d
        • Instruction ID: 65e5261cb0534463c85ab03b0dc42f61c36fee3029be9f4056877913a3383274
        • Opcode Fuzzy Hash: 52b51ec6a886e140a43fa1546eccafd0aa2afeb93e4570272d2029de4e32a98d
        • Instruction Fuzzy Hash: E2D1E1A1E186A88EF7248B24DC547EA7A75EF52314F0441F9C04D9B681E3BE4EC5CB62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$M$N$W$XS$a$d$e$e$e$e$i$l$l$m$o$t$u
        • API String ID: 0-631836822
        • Opcode ID: f040fc1b1ceefa8c3e22fe5aaff0c52c075260d7bb8bf48c043dcc52a0da3fc7
        • Instruction ID: 9bdcd3bdaa87f3222466e1fbb355c3ea2d350f5841786019114f53b0b754e762
        • Opcode Fuzzy Hash: f040fc1b1ceefa8c3e22fe5aaff0c52c075260d7bb8bf48c043dcc52a0da3fc7
        • Instruction Fuzzy Hash: 1422D635E2469986DB28CB39DC515DFB2B2AF58300F04D5FDD80DE7260E7B04A858F1A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$M$N$W$XS$a$d$e$e$e$e$i$l$l$m$o$t$u
        • API String ID: 0-631836822
        • Opcode ID: a7bc7a0a9f92f0a46198a887fd342772283fd6eada57ac732167ba01015e9fda
        • Instruction ID: e2ac67340669fe7dc0e3d4a94570565d20b9e1db74117272b863f336df0a5045
        • Opcode Fuzzy Hash: a7bc7a0a9f92f0a46198a887fd342772283fd6eada57ac732167ba01015e9fda
        • Instruction Fuzzy Hash: C022C535A246A986DB68CB39DC515DFB2B3AF58300F04D5FDD80DE7260E7B04A858B1A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$M$N$W$XS$a$d$e$e$e$e$i$l$l$m$o$t$u
        • API String ID: 0-631836822
        • Opcode ID: f14c6a6b304d15982bcc645e1031f3dbc280c4f8a2a8c86288841342b2cf9d81
        • Instruction ID: c9471ecf2500d5390cf7799ca73ebf8c053bf8fb0bde27cf027343df6a85b068
        • Opcode Fuzzy Hash: f14c6a6b304d15982bcc645e1031f3dbc280c4f8a2a8c86288841342b2cf9d81
        • Instruction Fuzzy Hash: 5412A835E2469986DB68CB39DC515DFA2B3AF58304F04D4FD980DE7264F7B04A898F0A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$M$N$W$a$d$e$e$e$e$i$l$l$m$o$t$u
        • API String ID: 0-3517196457
        • Opcode ID: 4a72ca80a5898bedfcfec54d247d636213a6dd87e6d0c2b7c3704d231e5d25e5
        • Instruction ID: 25749a44004dfbda671d992ce3cb56ce6f6267f2362c2814b83da223f9973ac7
        • Opcode Fuzzy Hash: 4a72ca80a5898bedfcfec54d247d636213a6dd87e6d0c2b7c3704d231e5d25e5
        • Instruction Fuzzy Hash: 2222C535E246A986DB28CB39DC415DFB6B3AF59300F04D4FDD80DE7260E7B04A858B1A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$M$N$W$a$d$e$e$e$e$i$l$l$m$o$t$u
        • API String ID: 0-3517196457
        • Opcode ID: 0ea0671903a478860ef13e711031dec5ba6a1e4e6c9a96cba29109451189e64e
        • Instruction ID: 0954fe185faa12d0578e69141b9ecd072a71bd87198a4748c6c5758a58ddf2bf
        • Opcode Fuzzy Hash: 0ea0671903a478860ef13e711031dec5ba6a1e4e6c9a96cba29109451189e64e
        • Instruction Fuzzy Hash: 3312B735E245A986DB28DB39DC415DFB2B3AF59304F04D4FD980DE7260E7B04A858F0A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$M$N$W$a$d$e$e$e$e$i$l$l$m$o$t$u
        • API String ID: 0-3517196457
        • Opcode ID: 02f8df7090725330c6e42bdcdea392cf619451a86e1c1682367f18b08b9d3d4a
        • Instruction ID: 1ad274fb6b62647d08e13d091594f49f38776d39e5af54889665963b3c7e8985
        • Opcode Fuzzy Hash: 02f8df7090725330c6e42bdcdea392cf619451a86e1c1682367f18b08b9d3d4a
        • Instruction Fuzzy Hash: 57029735A246A986DB28DB39DC515DFA2F3AF58304F04D5FD980DE7260E7B04A858F0A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: =MZ$F$G$M$N$W$a$d$e$e$e$e$i$l$l$m$o$t$u
        • API String ID: 0-3517196457
        • Opcode ID: d93c4e0ca418501e396ff54445ae0e1110e3851f7b52024ef11150b9b0cd99ea
        • Instruction ID: 0403b9b1d73c9a4ee8e022b08fd4d6891e86f9b52f546d2171b4c9be8313433e
        • Opcode Fuzzy Hash: d93c4e0ca418501e396ff54445ae0e1110e3851f7b52024ef11150b9b0cd99ea
        • Instruction Fuzzy Hash: E1029835A285A986DB28DB39DC515DFB2B3AF58304F04D4FD980DE7260E7B04A858F0A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: 57K[$L$L$L26B$P$W$X$a$a$b$d$i$o$r$r$y
        • API String ID: 0-2972370436
        • Opcode ID: a0670ca4b8dd819b6a046314425bb8d96a41e30e144971c85469be7b10ab588b
        • Instruction ID: 28b7150194c37e08f0f644bcb3a36495f4e86d4ed9d29c016fb86337dd508fb7
        • Opcode Fuzzy Hash: a0670ca4b8dd819b6a046314425bb8d96a41e30e144971c85469be7b10ab588b
        • Instruction Fuzzy Hash: BDD1BEB2E146A88EE7248B24DC147EABB75EF95310F0400FAD54D9B681E3795EC5CF12
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1404234fe335408f74247475c3702457d985ac8cee8814b3f70f2f05912fdc8a
        • Instruction ID: fd0cb057eb75de93ca267f8da870684cca46eb0e678d04678a17abea7268f6a7
        • Opcode Fuzzy Hash: 1404234fe335408f74247475c3702457d985ac8cee8814b3f70f2f05912fdc8a
        • Instruction Fuzzy Hash: 71D1CEB460C7549FE320DF29C58469ABBF1AF8A344F00892EE9D987311E375D849CF46
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: $ $ $($($(
        • API String ID: 0-721555338
        • Opcode ID: 5daca47ad72b58a1ddc7a84ced5d744ee440a16d36838470820a88dc8637b80c
        • Instruction ID: d33436b60f70ee665b676abd0645ca9b49701b0485f311226f870a2b78c20d9d
        • Opcode Fuzzy Hash: 5daca47ad72b58a1ddc7a84ced5d744ee440a16d36838470820a88dc8637b80c
        • Instruction Fuzzy Hash: FC0324B59083958BD324CF19C09039AFBE1BFC9744F15896EE9E89B351D7B1E805CB82
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: L$L$W$a$a$b$d$i$o$r$r$y
        • API String ID: 0-4069139063
        • Opcode ID: a9fee5cf925e68e554388337692e2cda912650e07ca0c55dc517c90eee7f847a
        • Instruction ID: c7c1ca6788bbbaa4bf1088fb096f5b5abbfdbbc74a28740fb9b23a20ae5de2ef
        • Opcode Fuzzy Hash: a9fee5cf925e68e554388337692e2cda912650e07ca0c55dc517c90eee7f847a
        • Instruction Fuzzy Hash: C581B3A1E082649EF7258B24DC44BEB7B79EF92710F0440FAD44D97681E7794EC5CB22
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4b1337446496e9c41b79cc917f4922fd1446a8c7c90269b4ddb14d3d9de821c2
        • Instruction ID: a76abfe854526680fafcfad502bee7e43e464ba02b716878063f9692c443fae1
        • Opcode Fuzzy Hash: 4b1337446496e9c41b79cc917f4922fd1446a8c7c90269b4ddb14d3d9de821c2
        • Instruction Fuzzy Hash: 7E91AEB1E196688AE7208B28DC44BDBB7B5EF55304F0440F9D40CA7681E7BA5EC1CB66
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: L$L$W$a$a$b$d$i$o$r$r$y
        • API String ID: 0-4069139063
        • Opcode ID: 3c9bce32a931c712ba117c291a31e0b6b9fbbbf1e0e8706c0d267598cb2360fa
        • Instruction ID: ce311ec0e27ecac432fc5f4d6d7f9d5334a9897412eac2d845516db30f962c61
        • Opcode Fuzzy Hash: 3c9bce32a931c712ba117c291a31e0b6b9fbbbf1e0e8706c0d267598cb2360fa
        • Instruction Fuzzy Hash: 2A71AFA2E082648EF7258B24DC44BEB7B75EF96710F0440FAD44D97681E7B94EC5CB22
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ogg_sync_reset$ogg_sync_bufferogg_sync_pageseekogg_sync_wrote
        • String ID:
        • API String ID: 632350164-0
        • Opcode ID: 92a936b52b7522ce8d2612016793d0b627fc50d7c21d1a1dad2587165fb270ab
        • Instruction ID: f61f2d4419897228a8fdd87f39eae92743ea70b66b62c284f0ce67d03c751ab3
        • Opcode Fuzzy Hash: 92a936b52b7522ce8d2612016793d0b627fc50d7c21d1a1dad2587165fb270ab
        • Instruction Fuzzy Hash: 4432D2B5A08340CFD764CF29C18064ABBE5BFD9714F18896EE9989B315D770E846CF82
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: 2c69cec9663df8044043cd5f9ba91e2764da172e4b9032e7ded2e00df08e3c54
        • Instruction ID: 5aaa57143d4bacb1274f32a247d54ad3a5f28d0f3a37418616ba36a66d037d00
        • Opcode Fuzzy Hash: 2c69cec9663df8044043cd5f9ba91e2764da172e4b9032e7ded2e00df08e3c54
        • Instruction Fuzzy Hash: D93215B2D011554FF728CB28CE99AEEBBB9EF91300F0481FAD40D9A990D7785BC58E41
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f8d0eb588c6d1fab9daa668e1bb90d9baa58ec6742406e2e04034729d53f2aeb
        • Instruction ID: 1f0c1ac1bd4803dced24c9c5168632f5537fc0ac37363043f6e6d6f735f7f5b9
        • Opcode Fuzzy Hash: f8d0eb588c6d1fab9daa668e1bb90d9baa58ec6742406e2e04034729d53f2aeb
        • Instruction Fuzzy Hash: 582257B2D041558FE728CB28CD99AEABBB9EF81304F0481FED40DA6690D7785AC5CF51
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: 97265be358c4b0becbda3c2f5296819fbc79d5d5780f777e745c19af7d0ebfcd
        • Instruction ID: ab1586359abf7d02ebc8eba4cfd914812f5e18a5eca07e94a0a8ca78262c0a97
        • Opcode Fuzzy Hash: 97265be358c4b0becbda3c2f5296819fbc79d5d5780f777e745c19af7d0ebfcd
        • Instruction Fuzzy Hash: FCE148B2C011554FF728CB28CD99BABBB79EF81304F0481FAC40D9A590D7796BC98E41
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4b78b094ffd19e0c92e4f6dbe88441d03148eb63550fa9591d98e56b0493746b
        • Instruction ID: 1a9ef9bc9fd8a033e46732ecf318cc482e62a718be2e8d278b0f073519042b31
        • Opcode Fuzzy Hash: 4b78b094ffd19e0c92e4f6dbe88441d03148eb63550fa9591d98e56b0493746b
        • Instruction Fuzzy Hash: 01E137B2D011555FF728CB28CD99BABBBB9EF81300F0481FAD40D96590D7796BC98E41
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: de2833d41ffebf8aec1fca4c0b2b0f8b8d6e75bc7f41af26f8b61cfba1b3aee9
        • Instruction ID: 7d3088db5ba3cc101ca1f6d6a0a81b98bd4d193ed386a3dec0d62f0ffaeb9e59
        • Opcode Fuzzy Hash: de2833d41ffebf8aec1fca4c0b2b0f8b8d6e75bc7f41af26f8b61cfba1b3aee9
        • Instruction Fuzzy Hash: 77C153B2D041654FF728CB28CD99AEABBB9EF81304F0441FED40966990D7785AC98A51
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: 8102311bc6637adb87f8ee11ea4be85a8c1ca76ee701976bbd67efe60959dda7
        • Instruction ID: 165333222c6f09a174eb44ab8e2389408f0a1195c520a56a7bbcf813fda11d4c
        • Opcode Fuzzy Hash: 8102311bc6637adb87f8ee11ea4be85a8c1ca76ee701976bbd67efe60959dda7
        • Instruction Fuzzy Hash: 36C142B2D041654FF728CA28DD99BEABBB9EF81304F0441FED40D66990D7785BC98E41
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_ustr_get
        • String ID:
        • API String ID: 661181409-0
        • Opcode ID: 3f3c1d4a04ad4ee4bbe194a05c9358800438f558a66e36147e4a5d84b67933ca
        • Instruction ID: 9a78e0702d8eb39bc839aba3c879c7656446eb3ce33b423e90603bde720557c2
        • Opcode Fuzzy Hash: 3f3c1d4a04ad4ee4bbe194a05c9358800438f558a66e36147e4a5d84b67933ca
        • Instruction Fuzzy Hash: 6461A6716187008BD728CA2CC48434BBBE2DBD6368F24877DE5648B2F9C276D99DD742
        APIs
        • ChannelsFromFmt.MSIMG32(?,?,?,?,646A0A83), ref: 646F708D
        • BytesFromFmt.MSIMG32(?,?,?,?,646A0A83), ref: 646F709E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: From$BytesChannels
        • String ID:
        • API String ID: 89695956-0
        • Opcode ID: eeb2a50bed4e018c7ee4b4e83facf1b38d3fc53300caa03c18d2e3c635b5ff2c
        • Instruction ID: e571b18fbfea6735f251555c75b4a1540d31a9ea8cbdea51741d71ec14d41113
        • Opcode Fuzzy Hash: eeb2a50bed4e018c7ee4b4e83facf1b38d3fc53300caa03c18d2e3c635b5ff2c
        • Instruction Fuzzy Hash: F8720475608391CBD7B4CF29C9847CAB7E2BBD8301F548A2ED98D8B315D770A846CB46
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: O$OggS
        • API String ID: 0-767359038
        • Opcode ID: 87a212e4b37c45c6524d88bac3c767231b7b6cccdcaaabfe23f68e603d07ced3
        • Instruction ID: 5e6b7c69554020dffc256769307fc82b1ea7e55e8d68007e295aee005801b3d1
        • Opcode Fuzzy Hash: 87a212e4b37c45c6524d88bac3c767231b7b6cccdcaaabfe23f68e603d07ced3
        • Instruction Fuzzy Hash: 71619F716086628FDB15CF69C580317BBF1BF99304F04856DD8849B706E374E999CBD2
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: A3<Y
        • API String ID: 0-1166355234
        • Opcode ID: 880a5a927a4a19420221ecaceff1111e8cc362ecfc152d11fafc9e145dbdd67d
        • Instruction ID: 608a9f72789443d1e1b46de8c63416dabebca456a280ec852963ab981234b8de
        • Opcode Fuzzy Hash: 880a5a927a4a19420221ecaceff1111e8cc362ecfc152d11fafc9e145dbdd67d
        • Instruction Fuzzy Hash: 76517BF2C1455CAFF314862CEC94AFB776CDF82324F2485BED90995180E9385EC14A66
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 18c6ed04cc5e12aa055bc81dce74bdb9fd94940b766b396505ee6a7f3288f075
        • Instruction ID: 2f47d35045638aad141d389dc6aa03b0fbb9da6d7cffe5f8f38f5fdbd2d97dbb
        • Opcode Fuzzy Hash: 18c6ed04cc5e12aa055bc81dce74bdb9fd94940b766b396505ee6a7f3288f075
        • Instruction Fuzzy Hash: 28C114B2D011554FF728CB28CD99AAFBBB9EF91300F1481FAC40D969A0D7786BC58E41
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a7565a3566d757948ddb7c2b7aac3dc001e6823964670f391099807d889e04cd
        • Instruction ID: c7d36a10719b25c4f6f08c46a2423b4d25c025518e1103fb9dae937aa5bcc58e
        • Opcode Fuzzy Hash: a7565a3566d757948ddb7c2b7aac3dc001e6823964670f391099807d889e04cd
        • Instruction Fuzzy Hash: 4F9137B2D011554FF728CB28CD98AAFBBB9EF91300F0481FAC40D965A0D7796BC68E41
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6ee2fcf2bfc76cfaf233f00851046546ca1012537dcf2748276b78b468563af8
        • Instruction ID: 4267a31f18a7d650b32aa2f065631babc37a54bc9a24b1c911f4e26b45b37abd
        • Opcode Fuzzy Hash: 6ee2fcf2bfc76cfaf233f00851046546ca1012537dcf2748276b78b468563af8
        • Instruction Fuzzy Hash: A7B18FB1E052698FEB64CF14CC90BAAB7B1BB86705F1481EAD84D67242DB349EC5CF41
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b1d14d626a237bc38311e4429103bb49a975839afd8ff95d0e65263d5db61685
        • Instruction ID: d9f99942193995c5eb5195c8a34cd4fdbb284ff4938503dc54d3a9152bc8834c
        • Opcode Fuzzy Hash: b1d14d626a237bc38311e4429103bb49a975839afd8ff95d0e65263d5db61685
        • Instruction Fuzzy Hash: 0D814AB2D011555FF728CB28CD98EAFBBB8EF92300F0481FAC40996590D7796BC58E51
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d2278b5742f6883bde83d08543079f3910fccee75930b95bd46bc7467451b24a
        • Instruction ID: f2cd062524dfbf552494f7ded1437eb923eb926eef084215fb89f46ceabef872
        • Opcode Fuzzy Hash: d2278b5742f6883bde83d08543079f3910fccee75930b95bd46bc7467451b24a
        • Instruction Fuzzy Hash: E881DFA2D142249AF728CB24DD54BFAB779EF94310F0040FED50A97681EB795EC1DB12
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a6cdd7867e7f02e6b236f4308d4ac05692bb38f8632489b928ab546feebbf124
        • Instruction ID: faec2a152998f80f4ed265e815bf7d937553b4b6be27fab766e27b8e747af0a1
        • Opcode Fuzzy Hash: a6cdd7867e7f02e6b236f4308d4ac05692bb38f8632489b928ab546feebbf124
        • Instruction Fuzzy Hash: C2515BE3D541486FF314822CED4AEFB3B2CDBD2324F28467EE84E85680E52D5AC64567
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: bf68aea1e06a90108e7b7e437ccc306902c961b540d1615cbd96925eefa9a9ae
        • Instruction ID: 0fdc408677d32c9c40a251c6bab62984937b1d2304615de466e8a8b1cb22ef71
        • Opcode Fuzzy Hash: bf68aea1e06a90108e7b7e437ccc306902c961b540d1615cbd96925eefa9a9ae
        • Instruction Fuzzy Hash: 845159E3D540486FF304822CED45EFB3B1CDBC2324F24467EE84E86680E52D6AC64667
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 802da0ea343f0fc2ab910f09d1e1afce025497b291ce9d5772f3f1e9379b360b
        • Instruction ID: 41c8916d9584ae9cb98f0343bd7c89e3438a6b9731b212c59169584e6086869a
        • Opcode Fuzzy Hash: 802da0ea343f0fc2ab910f09d1e1afce025497b291ce9d5772f3f1e9379b360b
        • Instruction Fuzzy Hash: 59518BE2C1415CAFF314862CEC95AFB7768DF82324F2485BED90995180E9395EC14B67
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 70892f136e76b8925008122da2e214e9f0f981d51084b54776ffacaaa6d5bb43
        • Instruction ID: 9ba1cc5f0e5857a31239465669bdc72c2f1527dfe7a9eb477c4982ca54fbdfbd
        • Opcode Fuzzy Hash: 70892f136e76b8925008122da2e214e9f0f981d51084b54776ffacaaa6d5bb43
        • Instruction Fuzzy Hash: BB5100A2E146249BF7248B24DD04BFB7779EF94710F0080BED50D97681EB794EC29B22
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 79c9708d363da6681dc96212cac583c1767ac22817a3d9be119f6c3e06254c9b
        • Instruction ID: c5901230589b6dd4e00fc0f2d522d0b645103a1b9b1400e72c517a15afa22756
        • Opcode Fuzzy Hash: 79c9708d363da6681dc96212cac583c1767ac22817a3d9be119f6c3e06254c9b
        • Instruction Fuzzy Hash: EF4166E3D540486FF304863CED49EFB371CCBC2324F24467EE84A865C4E92D6AC64662
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4a212d99e8e568ffb15bc569eb31c61cc894e93018160f00176cf71a0a5adfce
        • Instruction ID: 33f4a3ac0afbd850df8c729359e9221927aca475cf10085fb3ea6c5d29410dc9
        • Opcode Fuzzy Hash: 4a212d99e8e568ffb15bc569eb31c61cc894e93018160f00176cf71a0a5adfce
        • Instruction Fuzzy Hash: A8416BE2D1844CAFF3148638ED559FB3768DF92324F2445BED94989180E5285EC24677
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: aba5c34345dc99295672e92228156dcfe14868be48136e1284a03f9cf85b76d9
        • Instruction ID: 0cdbeae3b7da7291b6c738627a529a8b7ac4af1557c7a4ad5f485a0f6cca37c4
        • Opcode Fuzzy Hash: aba5c34345dc99295672e92228156dcfe14868be48136e1284a03f9cf85b76d9
        • Instruction Fuzzy Hash: 6F51DCB2D44169CBE754CB28DCA0AEBB3B4FF45304F0081BAD849A7644E7386E85CF95
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 33c7ba789cc3a44fb3259bc729746acbffbd1e40639ac0b14d81c4dc71631467
        • Instruction ID: c72baf29eb9cb79a79708df9095788476e379200d5d5017b9e43f021a0e2ca0b
        • Opcode Fuzzy Hash: 33c7ba789cc3a44fb3259bc729746acbffbd1e40639ac0b14d81c4dc71631467
        • Instruction Fuzzy Hash: 814110B45083228FD714CF2AC89825ABBF1EFCA349F14882DE6D487354D679E585CF52
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 41ec367d26308969154536732934ad7c6188dab42ab7262c86c47480d5b2974a
        • Instruction ID: d3018f83aa0d9d99184a75f76a23396ea45edccd7195982d10fb9cbfb534acf4
        • Opcode Fuzzy Hash: 41ec367d26308969154536732934ad7c6188dab42ab7262c86c47480d5b2974a
        • Instruction Fuzzy Hash: 4201E47B3B4D0B035B4C8078ED3767910D2A3C62157C8AA3DF9BBC96C2E62DC4A58245
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 86f409e129d6956a5292e8e537a2118996d0084b31a598e7e5425b5e0cc4f27f
        • Instruction ID: 8b3f944b1aba00a58df5423fc17527eeefcffd5516f0c6f95bda4eab1b02e1db
        • Opcode Fuzzy Hash: 86f409e129d6956a5292e8e537a2118996d0084b31a598e7e5425b5e0cc4f27f
        • Instruction Fuzzy Hash: B5A00238298111CF8608CF08C0A4C0477F4E7157403115481E800C7B65C330EC40CB80
        APIs
        • _al_get_new_display_settings.MSIMG32 ref: 645FC539
          • Part of subcall function 64624A18: __emutls_get_address.MSIMG32(?,?,?,00000000,645FBB25), ref: 64624A24
        • _al_set_new_display_settings.MSIMG32 ref: 645FC557
          • Part of subcall function 64624940: __emutls_get_address.MSIMG32(?,?,?,?,645FC55C), ref: 6462494C
        • _al_get_new_display_settings.MSIMG32 ref: 645FC55C
        • _al_get_new_display_settings.MSIMG32 ref: 645FC56F
        • _al_get_new_display_settings.MSIMG32 ref: 645FC582
        • _al_get_new_display_settings.MSIMG32 ref: 645FC595
        • _al_get_new_display_settings.MSIMG32 ref: 645FC5A8
        • _al_get_new_display_settings.MSIMG32 ref: 645FC5BB
        • _al_get_new_display_settings.MSIMG32 ref: 645FC5CE
        • _al_get_new_display_settings.MSIMG32 ref: 645FC5E1
        • _al_get_new_display_settings.MSIMG32 ref: 645FC5FA
        • _al_get_new_display_settings.MSIMG32 ref: 645FC640
        • _al_get_new_display_settings.MSIMG32 ref: 645FC666
        • _al_get_new_display_settings.MSIMG32 ref: 645FC748
        • _al_get_new_display_settings.MSIMG32 ref: 645FC76E
        • _al_get_new_display_settings.MSIMG32 ref: 645FC788
        • _al_get_new_display_settings.MSIMG32 ref: 645FC7AE
        • _al_get_new_display_settings.MSIMG32 ref: 645FC7E0
        • _al_get_new_display_settings.MSIMG32 ref: 645FC806
        • _al_get_new_display_settings.MSIMG32 ref: 645FC828
        • _al_get_new_display_settings.MSIMG32 ref: 645FC84E
        • _al_get_new_display_settings.MSIMG32 ref: 645FC884
        • _al_get_new_display_settings.MSIMG32 ref: 645FC8B1
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_get_new_display_settings$__emutls_get_address$_al_set_new_display_settings
        • String ID:
        • API String ID: 2701111176-0
        • Opcode ID: 333ba2134ab1155d0400ab9fb5bfc92140532ce45d99b6e7c77781cd2cc4d19d
        • Instruction ID: c237c2c5b0fc49d0299789c70c7d3d83d0b2129367fd3cb528ed1d6ed747b603
        • Opcode Fuzzy Hash: 333ba2134ab1155d0400ab9fb5bfc92140532ce45d99b6e7c77781cd2cc4d19d
        • Instruction Fuzzy Hash: DB1219B14167429FE3619FA89948B167AA0BF1233BF038398C5691B1F1C771C50ADF6B
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ConfigValue$CriticalSection$BoolDecomposeEnterFormatLeave
        • String ID: :-$AL_FORMAT_51CHN16$AL_FORMAT_51CHN32$AL_FORMAT_51CHN8$AL_FORMAT_61CHN16$AL_FORMAT_61CHN32$AL_FORMAT_61CHN8$AL_FORMAT_71CHN16$AL_FORMAT_71CHN32$AL_FORMAT_71CHN8$AL_FORMAT_MONO16$AL_FORMAT_MONO32$AL_FORMAT_MONO8$AL_FORMAT_QUAD16$AL_FORMAT_QUAD32$AL_FORMAT_QUAD8$AL_FORMAT_STEREO16$AL_FORMAT_STEREO32$AL_FORMAT_STEREO8$H-$Unknown format: "%s"$cf_level$d:\Libraries\build\allegro\src\openal-soft-1.14\Alc\ALc.c$format$frequency$period_size$periods$sends$slots$sources$stereodup
        • API String ID: 1041631076-3192723699
        • Opcode ID: 65699e8f251668f35234266f86d6813a5a512d7acccac1da22adcef7ec825d8d
        • Instruction ID: d744bb4841797a4554716d022e43b2c82bf1ed625a96b236a80117dea83d4e87
        • Opcode Fuzzy Hash: 65699e8f251668f35234266f86d6813a5a512d7acccac1da22adcef7ec825d8d
        • Instruction Fuzzy Hash: 75E15AB02187069FE7419F14CA4479E7BE4EF52B08F41891DE8999B351D7B8C888DF87
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_fread32le$al_fread16le$al_feofal_ferror$al_ftell
        • String ID: $ $3$8$BM
        • API String ID: 3127332396-3340244431
        • Opcode ID: 43ff3c68a6091717a3984d213873f6e4f366cbcc15c2f660d75932fc7b07e170
        • Instruction ID: b976409fd360ec7c59d41a39e8ac69595a0a0c83bf949ad038802689cae8f4b3
        • Opcode Fuzzy Hash: 43ff3c68a6091717a3984d213873f6e4f366cbcc15c2f660d75932fc7b07e170
        • Instruction Fuzzy Hash: EF7106B1108744DFE790AF68D88432EBBF1AF86748F41481EE8C947651C7B98885EF0B
        APIs
        • _al_vector_init.MSIMG32 ref: 645CE6C4
        • _al_vector_alloc_back.MSIMG32 ref: 645CE70E
        • _al_vector_alloc_back.MSIMG32 ref: 645CE76E
        • _al_vector_alloc_back.MSIMG32 ref: 645CE7CE
        • _al_vector_alloc_back.MSIMG32 ref: 645CE82E
        • _al_vector_alloc_back.MSIMG32 ref: 645CE88E
        • _al_add_exit_func.MSIMG32 ref: 645CE8B9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_vector_alloc_back$_al_add_exit_func_al_vector_init
        • String ID: .bmp$.jpg$.pcx$.png$.tga$font_shutdown
        • API String ID: 1624829513-671147614
        • Opcode ID: 8929e4df9c90d4a6b115fdabe90a7785b09c402d518d258809645199e22a1ce6
        • Instruction ID: e6eb4e25100621b73d591ab3a310c695cd30d211453559a80372fd75e24fa0ff
        • Opcode Fuzzy Hash: 8929e4df9c90d4a6b115fdabe90a7785b09c402d518d258809645199e22a1ce6
        • Instruction Fuzzy Hash: 5B51F6B4468781CFDB55EFA4925621DBBE0AF26B44F428A6CC6D4CB720E730C850EB57
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_fwrite32le$al_fwrite16le$al_fputc$__emutls_get_addressal_get_bitmap_heightal_get_errnoal_lock_bitmapal_set_errnoal_unlock_bitmap
        • String ID: ($BM
        • API String ID: 2110601859-2980357723
        • Opcode ID: 4e889934865886193c0b9eee20781bff5e1e01e90d6a75077e1f37caa7e9b363
        • Instruction ID: 28a5f9835eeb2cce3372936fd13efdd9bc0323633059bcb191afe13ffd76f7b4
        • Opcode Fuzzy Hash: 4e889934865886193c0b9eee20781bff5e1e01e90d6a75077e1f37caa7e9b363
        • Instruction Fuzzy Hash: BE51DFB24197409BE340AF28CA9022EFBE1BF84748F05992EE4C99B641C778D945EF43
        APIs
        • al_ref_cstr.MSIMG32 ref: 64622748
        • al_ref_cstr.MSIMG32 ref: 64622760
        • al_ustr_has_prefix_cstr.MSIMG32 ref: 64622782
          • Part of subcall function 64659F34: _al_bstrncmp.MSIMG32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,64622787), ref: 64659F73
        • al_ustr_find_chr.MSIMG32 ref: 646227A2
          • Part of subcall function 646593E0: _al_binstr.MSIMG32(?,?,?,?,?,?,?,645FADE7), ref: 64659438
        • al_ustr_assign_substr.MSIMG32 ref: 646227FB
        • al_cstr.MSIMG32 ref: 64622803
        • _al_vector_alloc_back.MSIMG32 ref: 64622813
        • al_ustr_find_chr.MSIMG32 ref: 6462283B
        • al_ustr_size.MSIMG32 ref: 6462284A
        • al_ustr_assign_substr.MSIMG32 ref: 6462285E
        • al_ustr_equal.MSIMG32 ref: 6462286E
        • al_ustr_equal.MSIMG32 ref: 64622882
        • al_cstr.MSIMG32 ref: 6462288E
        • _al_vector_alloc_back.MSIMG32 ref: 6462289F
        • al_ustr_assign_substr.MSIMG32 ref: 646227D4
          • Part of subcall function 6465905C: _al_bassignmidstr.MSIMG32 ref: 64659080
        • al_ustr_offset.MSIMG32 ref: 646228CF
        • al_ustr_get.MSIMG32 ref: 646228E1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_ustr_assign_substr$_al_vector_alloc_backal_cstral_ref_cstral_ustr_equalal_ustr_find_chr$_al_bassignmidstr_al_binstr_al_bstrncmpal_ustr_getal_ustr_has_prefix_cstral_ustr_offsetal_ustr_size
        • String ID: /
        • API String ID: 727739981-2043925204
        • Opcode ID: 253bcaa927f376b69060b5dc267dca8eb1ef064f632c0c618c3c0d3b99bfaa2b
        • Instruction ID: c594037b72f9bb7a089462cc0368faa79502c93b4d992d46df02fc78e76ad4f1
        • Opcode Fuzzy Hash: 253bcaa927f376b69060b5dc267dca8eb1ef064f632c0c618c3c0d3b99bfaa2b
        • Instruction Fuzzy Hash: 6251D3B0519700DFD745EF29C18026EBBE0AF88758F01895EE4988B320D739C9A5DF4B
        APIs
        • al_create_event_queue.MSIMG32 ref: 645CB7B1
          • Part of subcall function 645FE860: al_malloc_with_context.MSIMG32 ref: 645FE884
          • Part of subcall function 645FE860: _al_vector_init.MSIMG32 ref: 645FE89A
          • Part of subcall function 645FE860: _al_vector_init.MSIMG32 ref: 645FE8AD
          • Part of subcall function 645FE860: _al_vector_alloc_back.MSIMG32 ref: 645FE8B5
          • Part of subcall function 645FE860: _al_mutex_init.MSIMG32 ref: 645FE8D5
          • Part of subcall function 645FE860: _al_cond_init.MSIMG32 ref: 645FE8E0
          • Part of subcall function 645FE860: _al_register_destructor.MSIMG32 ref: 645FE8F9
        • al_register_event_source.MSIMG32 ref: 645CB7BF
          • Part of subcall function 645FE908: _al_vector_contains.MSIMG32(?,?,?,?,?,645CB7C4), ref: 645FE91B
        • al_wait_for_event.MSIMG32 ref: 645CB7E1
          • Part of subcall function 645FED2C: EnterCriticalSection.KERNEL32 ref: 645FED40
          • Part of subcall function 645FED2C: _al_cond_wait.MSIMG32 ref: 645FED5B
          • Part of subcall function 645FED2C: _al_vector_ref.MSIMG32 ref: 645FED7A
          • Part of subcall function 645FED2C: LeaveCriticalSection.KERNEL32(?), ref: 645FEDA2
        • al_get_time.MSIMG32 ref: 645CB811
        • al_emit_user_event.MSIMG32 ref: 645CB82D
        • al_destroy_event_queue.MSIMG32 ref: 645CB835
        • al_lock_mutex.MSIMG32 ref: 645CB863
        • al_unlock_mutex.MSIMG32 ref: 645CB8C7
        • al_get_channel_count.MSIMG32 ref: 645CB8E7
        • al_get_audio_depth_size.MSIMG32 ref: 645CB8F7
        • al_lock_mutex.MSIMG32 ref: 645CB90F
        • al_unlock_mutex.MSIMG32 ref: 645CB93C
        • al_lock_mutex.MSIMG32 ref: 645CB99F
        • al_unlock_mutex.MSIMG32 ref: 645CB9BC
        • al_lock_mutex.MSIMG32 ref: 645CB9CE
        Strings
        • Attempted to set a stream buffer with a full pending list, xrefs: 645CBA5C
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_lock_mutex$al_unlock_mutex$CriticalSection_al_vector_init$EnterLeave_al_cond_init_al_cond_wait_al_mutex_init_al_register_destructor_al_vector_alloc_back_al_vector_contains_al_vector_refal_create_event_queueal_destroy_event_queueal_emit_user_evental_get_audio_depth_sizeal_get_channel_countal_get_timeal_malloc_with_contextal_register_event_sourceal_wait_for_event
        • String ID: Attempted to set a stream buffer with a full pending list
        • API String ID: 4016002539-402962720
        • Opcode ID: 1432cc67f7a063353009d8c735722129563887f82e5b30c3d155b66820dc3a1e
        • Instruction ID: 84801bf62ce76a059d7961f1b9633c97ba303647f5e57be146805ba1c53169f9
        • Opcode Fuzzy Hash: 1432cc67f7a063353009d8c735722129563887f82e5b30c3d155b66820dc3a1e
        • Instruction Fuzzy Hash: 31A138707087429BE704EFB9E4847AAFBE4BF45704F00892DD8A897201E775E855DBA3
        APIs
        • al_calloc_with_context.MSIMG32 ref: 645CD07B
        • al_free_with_context.MSIMG32 ref: 645CD0C6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_calloc_with_contextal_free_with_context
        • String ID: AL_FORMAT_51CHN_16$AL_FORMAT_61CHN_16$AL_FORMAT_71CHN_16$AL_FORMAT_QUAD16$_openal_allocate_voice$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\openal.c
        • API String ID: 973425427-3490697798
        • Opcode ID: a0ca966a34b10fd87a03d13f773bd8d6813b1508070940b666003902a4b7aa91
        • Instruction ID: 819e879949897b6df6e83c3d7ab535b47a8efbdab479c9cf2b44c847fdfd23fa
        • Opcode Fuzzy Hash: a0ca966a34b10fd87a03d13f773bd8d6813b1508070940b666003902a4b7aa91
        • Instruction Fuzzy Hash: EB61FBB0548705DBE7119F98EA4132EBBE0EF92704F11C91DE0A48B340E379C58ADB47
        APIs
        • vorbis_info_init.MSIMG32 ref: 6471758E
        • vorbis_comment_init.MSIMG32 ref: 6471759A
        • ogg_page_bos.MSIMG32 ref: 647175B3
        • ogg_page_serialno.MSIMG32 ref: 647175E4
        • ogg_page_serialno.MSIMG32 ref: 64717611
        • ogg_page_serialno.MSIMG32 ref: 6471766C
        • ogg_stream_reset_serialno.MSIMG32 ref: 6471767C
        • ogg_stream_pagein.MSIMG32 ref: 6471768C
        • ogg_stream_packetout.MSIMG32 ref: 647176A0
        • vorbis_synthesis_idheader.MSIMG32 ref: 647176B0
        • vorbis_info_clear.MSIMG32 ref: 64717713
        • vorbis_comment_clear.MSIMG32 ref: 6471771F
        • ogg_stream_packetout.MSIMG32 ref: 6471790B
        • ogg_page_serialno.MSIMG32 ref: 6471792E
        • ogg_page_bos.MSIMG32 ref: 6471793E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ogg_page_serialno$ogg_page_bosogg_stream_packetout$ogg_stream_pageinogg_stream_reset_serialnovorbis_comment_clearvorbis_comment_initvorbis_info_clearvorbis_info_initvorbis_synthesis_idheader
        • String ID:
        • API String ID: 2971266059-0
        • Opcode ID: 1816f66976aef612d5ca3e05874293728bd30f1c8f22a3c6c6eec228dcf02d1a
        • Instruction ID: c161479530c39844e9bc93666295b355e034790a2c60be6d2e430151e807523b
        • Opcode Fuzzy Hash: 1816f66976aef612d5ca3e05874293728bd30f1c8f22a3c6c6eec228dcf02d1a
        • Instruction Fuzzy Hash: D5D1597420C3408FE705EF29C68461EB7F6BF89718F18892DE8998B355DB34E945CB82
        APIs
        • al_ref_ustr.MSIMG32 ref: 645CF78F
        • al_ustr_find_cset_cstr.MSIMG32 ref: 645CF7BA
          • Part of subcall function 64659968: al_ustr_find_cset.MSIMG32 ref: 646599A7
        • al_ustr_size.MSIMG32 ref: 645CF7E4
        • al_ustr_find_set_cstr.MSIMG32 ref: 645CF7D5
          • Part of subcall function 64659790: al_ustr_find_set.MSIMG32 ref: 646597CF
        • al_ustr_find_cset_cstr.MSIMG32 ref: 645CF968
        • al_ustr_find_set_cstr.MSIMG32 ref: 645CF987
        • al_ref_ustr.MSIMG32 ref: 645CF9AA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_ref_ustral_ustr_find_cset_cstral_ustr_find_set_cstr$al_ustr_find_csetal_ustr_find_setal_ustr_size
        • String ID:
        • API String ID: 554529905-184147866
        • Opcode ID: d5d4e575275401a9a47f1b7e49dd748187b5b353a784c539888ca8894ce8eaa8
        • Instruction ID: c531a9af17464b8295539ba31ffa38355c86d599cb6b5eb0f44e0036b35319c6
        • Opcode Fuzzy Hash: d5d4e575275401a9a47f1b7e49dd748187b5b353a784c539888ca8894ce8eaa8
        • Instruction Fuzzy Hash: 66A1D8B1A09341EFC310AF24D18429EBBE1EF85754F519D1EE9D9A7290D3318861CF8B
        APIs
        • al_get_system_config.MSIMG32(?,?,00000000,00064270,?,?,645CA989), ref: 645CA49B
        • al_get_config_value.MSIMG32 ref: 645CA4BD
        • al_get_config_value.MSIMG32 ref: 645CA4E7
        • al_get_config_value.MSIMG32 ref: 645CA511
        • al_get_config_value.MSIMG32 ref: 645CA53B
        • al_attach_mixer_to_voice.MSIMG32 ref: 645CA574
        • al_destroy_mixer.MSIMG32 ref: 645CA589
        • al_destroy_voice.MSIMG32 ref: 645CA5A8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_get_config_value$al_attach_mixer_to_voiceal_destroy_mixeral_destroy_voiceal_get_system_config
        • String ID: $audio$int16$primary_mixer_depth$primary_mixer_frequency$primary_voice_depth$primary_voice_frequency
        • API String ID: 1331222334-1213999577
        • Opcode ID: 19381b1225fb801865036e9b104a302066316657941a357dcbc9194b7d86750a
        • Instruction ID: f4f21c0655e19585d597a1baf0c428b7068563a68be863e0b8239cf0524adc6c
        • Opcode Fuzzy Hash: 19381b1225fb801865036e9b104a302066316657941a357dcbc9194b7d86750a
        • Instruction Fuzzy Hash: 54419EB1A083419BEB009FB5E59432A7FE0EB81754F018A2DD5A88B751E739CC80FB53
        APIs
        • al_get_system_config.MSIMG32 ref: 645C4610
        • al_get_config_value.MSIMG32(?,?,?,?,?,00000001,645C4845), ref: 645C462C
        • _al_stricmp.MSIMG32(?,?,?,?,?,00000001,645C4845), ref: 645C4653
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_stricmpal_get_config_valueal_get_system_config
        • String ID: ALSA$DIRECTSOUND$DSOUND$OPENAL$OSS$PULSEAUDIO$audio$driver
        • API String ID: 474537536-4036240856
        • Opcode ID: a0ef5467fef17fec983015561252fb3cd64916372a85e6a0c9ed2f6088c24eee
        • Instruction ID: 8e74ccebb95b0ccf216052d2afb9f81c74504ff0e23991d4962c0d34bd2cc514
        • Opcode Fuzzy Hash: a0ef5467fef17fec983015561252fb3cd64916372a85e6a0c9ed2f6088c24eee
        • Instruction Fuzzy Hash: 0A1130A024970086E701AFF4EB8175EB7A49F52709F419E2C98859B305E734C8D0FF03
        APIs
        • _al_unregister_destructor.MSIMG32 ref: 645FE741
          • Part of subcall function 645FE3FC: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,645C5EA8,?,?,?,?,?,?,645C93B8), ref: 645FE414
          • Part of subcall function 645FE3FC: _al_vector_ref.MSIMG32(?,?,?,?,?,?,645C5EA8,?,?,?,?,?,?,645C93B8), ref: 645FE435
          • Part of subcall function 645FE3FC: _al_vector_delete_at.MSIMG32(?,?,?,?,?,?,645C5EA8,?,?,?,?,?,?,645C93B8), ref: 645FE445
          • Part of subcall function 645FE3FC: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,645C5EA8,?,?,?,?,?,?,645C93B8), ref: 645FE453
        • _al_vector_ref_back.MSIMG32 ref: 645FE75A
        • EnterCriticalSection.KERNEL32 ref: 645FE76F
        • _al_vector_find_and_delete.MSIMG32 ref: 645FE77C
        • LeaveCriticalSection.KERNEL32 ref: 645FE78F
        • _al_event_source_on_unregistration_from_queue.MSIMG32 ref: 645FE7A8
        • EnterCriticalSection.KERNEL32(00000000), ref: 645FE7B7
        • LeaveCriticalSection.KERNEL32(00000000), ref: 645FE7D6
        • _al_vector_free.MSIMG32 ref: 645FE7EA
        • _al_vector_free.MSIMG32 ref: 645FE7F5
        • _al_cond_destroy.MSIMG32 ref: 645FE800
        • _al_mutex_destroy.MSIMG32 ref: 645FE80B
        • al_free_with_context.MSIMG32 ref: 645FE82B
        Strings
        • al_destroy_event_queue, xrefs: 645FE810
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\events.c, xrefs: 645FE818
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave$_al_vector_free$_al_cond_destroy_al_event_source_on_unregistration_from_queue_al_mutex_destroy_al_unregister_destructor_al_vector_delete_at_al_vector_find_and_delete_al_vector_ref_al_vector_ref_backal_free_with_context
        • String ID: al_destroy_event_queue$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\events.c
        • API String ID: 132139030-553640495
        • Opcode ID: d885eb87bd575a60004045c72a4f08f991209202a143ff132001dacfb32179ef
        • Instruction ID: 5412a670c8503f65cc39c35431896f8f71f7c2250379050834f41f43e57b014a
        • Opcode Fuzzy Hash: d885eb87bd575a60004045c72a4f08f991209202a143ff132001dacfb32179ef
        • Instruction Fuzzy Hash: 8231F4B45097408FEB40EF79D8C4A2ABBE4AF58608F01886DE8988B305D734D846DF57
        APIs
        • __PHYSFS_platformGrabMutex.MSIMG32 ref: 64682688
        • __PHYSFS_platformReleaseMutex.MSIMG32 ref: 646826CD
        • __PHYSFS_setError.MSIMG32 ref: 6468273C
        • __PHYSFS_setError.MSIMG32 ref: 64682787
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ErrorMutexS_platformS_set$GrabRelease
        • String ID: Insecure filename$Invalid argument$Out of memory$Write directory is not set$irectSoundCapture
        • API String ID: 932224727-3624582895
        • Opcode ID: dc2e6a73f31fa8c0b4aae088b5d393d23dfb27f4736e2ac59cfeef04cc7991f0
        • Instruction ID: 9b8107c92f50013cd7612d2f3ce2df05dfbdbcbdfac2a54d2bcf78184d310970
        • Opcode Fuzzy Hash: dc2e6a73f31fa8c0b4aae088b5d393d23dfb27f4736e2ac59cfeef04cc7991f0
        • Instruction Fuzzy Hash: 8351BFB5A092498FDB00DF79D4C46EEBBF2FF5A324F508529E8509B341D7319885CBA2
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6469A703
        • EnterCriticalSection.KERNEL32(00000000), ref: 6469A710
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 6469A73D
        • EnterCriticalSection.KERNEL32(?,00000000,00000000), ref: 6469A78A
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 6469A7D3
        • EnterCriticalSection.KERNEL32(?,00000000,00000000), ref: 6469A7E0
        • LeaveCriticalSection.KERNEL32(00000000,?,00000000,00000000), ref: 6469A7F7
        • LeaveCriticalSection.KERNEL32(00000000,?,00000000,00000000), ref: 6469A821
        • LeaveCriticalSection.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 6469A83B
        • LeaveCriticalSection.KERNEL32(00000000,?,00000000,00000000), ref: 6469A8A7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Leave$Enter
        • String ID: :-
        • API String ID: 2978645861-2031694841
        • Opcode ID: da6fc5e2b7e612a2e00fc7ffea3760ad3ded8e4ca7d8dbd269eacc56af7ff418
        • Instruction ID: 2c9a76989d838447e652b289f092e6c30fd1643fb1d4946799429eb657b22d60
        • Opcode Fuzzy Hash: da6fc5e2b7e612a2e00fc7ffea3760ad3ded8e4ca7d8dbd269eacc56af7ff418
        • Instruction Fuzzy Hash: B251C370A19287EEE7919F7886D9A1E77F4AF26358F81586DE0D0DA300D7B4C089CB53
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: AllocFreeS_initS_smallSmall$ByteCharCloseFileHandleMultiS_utf8TimeUcs2Wide
        • String ID: irectSoundCapture
        • API String ID: 2920675050-4189381426
        • Opcode ID: adf465d0680a9306455b40610d381c2fde3241bb56aaa9173746d13060d002c5
        • Instruction ID: eebf20657be96547f9aecdacdaa6cab0a9c14a7d6603a60842500d14db963ecb
        • Opcode Fuzzy Hash: adf465d0680a9306455b40610d381c2fde3241bb56aaa9173746d13060d002c5
        • Instruction Fuzzy Hash: F2618D71A083058FEB00EF79C49436EBBF5EF84354F108A2DE49897390EB74D4448BA2
        APIs
        • _al_vector_ref.MSIMG32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,645FE9E7), ref: 645FE5C6
        • _al_vector_init.MSIMG32 ref: 645FE5EE
        • _al_vector_ref.MSIMG32 ref: 645FE640
        • EnterCriticalSection.KERNEL32(?), ref: 645FE66F
        • LeaveCriticalSection.KERNEL32(00000000,?), ref: 645FE68D
        • al_free_with_context.MSIMG32 ref: 645FE6BB
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\events.c, xrefs: 645FE6A8
        • al_unref_user_event, xrefs: 645FE6A0
        • @, xrefs: 645FE5E3
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection_al_vector_ref$EnterLeave_al_vector_inital_free_with_context
        • String ID: @$al_unref_user_event$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\events.c
        • API String ID: 259631193-3120285636
        • Opcode ID: 9d1917ea2e833c00678e88d592aa4577954fd909508a69bcab96235d6ee5a152
        • Instruction ID: a065d3a781433c4c2d0037d644f77b1ad7cfbf5ed013e796f413b2afe1a25df4
        • Opcode Fuzzy Hash: 9d1917ea2e833c00678e88d592aa4577954fd909508a69bcab96235d6ee5a152
        • Instruction Fuzzy Hash: A2414DB06097098FD744DF68D98461EBBE2FF98744F12896DD8989B301E734E846DF82
        APIs
        • al_is_system_installed.MSIMG32 ref: 64669148
        • al_get_standard_path.MSIMG32 ref: 6466915C
          • Part of subcall function 64623BE8: al_clone_path.MSIMG32(?,?,?,?,?,?,?,?,?,?,64600A5D), ref: 64623C08
          • Part of subcall function 64623BE8: al_set_path_filename.MSIMG32 ref: 64623C1C
        • al_path_cstr.MSIMG32 ref: 6466917A
          • Part of subcall function 64622CAC: al_ustr_assign.MSIMG32 ref: 64622CC8
          • Part of subcall function 64622CAC: _al_vector_ref.MSIMG32 ref: 64622CEB
          • Part of subcall function 64622CAC: al_ustr_append.MSIMG32 ref: 64622CF9
          • Part of subcall function 64622CAC: al_ustr_append_chr.MSIMG32 ref: 64622D05
          • Part of subcall function 64622CAC: al_ustr_append.MSIMG32 ref: 64622D1A
        • _al_sane_strncpy.MSIMG32 ref: 646691A9
        • PathFindOnPathA.SHLWAPI ref: 646691B9
        • LoadLibraryA.KERNEL32 ref: 646691C8
        • al_destroy_path.MSIMG32 ref: 646691D7
        • al_destroy_path.MSIMG32 ref: 646691E3
        • GetModuleFileNameA.KERNEL32 ref: 6466920B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: Pathal_destroy_pathal_ustr_append$FileFindLibraryLoadModuleName_al_sane_strncpy_al_vector_refal_clone_pathal_get_standard_pathal_is_system_installedal_path_cstral_set_path_filenameal_ustr_append_chral_ustr_assign
        • String ID: \
        • API String ID: 2760430602-2967466578
        • Opcode ID: 8a2591a58453cdb9936ec075eee996b4326a1a0f145a4a8ee0db9ef2ed5de582
        • Instruction ID: 4a82effa172e9f07c054f94cfa0879069423be9daa0f8869197bdc623ddedd16
        • Opcode Fuzzy Hash: 8a2591a58453cdb9936ec075eee996b4326a1a0f145a4a8ee0db9ef2ed5de582
        • Instruction Fuzzy Hash: 252113B05187419AE740AF34D58439FBAE4AF45348F414C2DE8D68B380D778854CCBA7
        APIs
        • EnterCriticalSection.KERNEL32 ref: 646244EA
        • _al_vector_find_and_delete.MSIMG32 ref: 646244FF
        • LeaveCriticalSection.KERNEL32 ref: 6462452A
        • _al_thread_join.MSIMG32 ref: 64624537
        • al_free_with_context.MSIMG32 ref: 64624557
        • _al_unregister_destructor.MSIMG32 ref: 64624568
        • _al_event_source_free.MSIMG32 ref: 64624570
        • al_free_with_context.MSIMG32 ref: 64624590
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSectional_free_with_context$EnterLeave_al_event_source_free_al_thread_join_al_unregister_destructor_al_vector_find_and_delete
        • String ID: al_destroy_timer$al_stop_timer$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\timernu.c
        • API String ID: 3369986114-2851958027
        • Opcode ID: 820285ceafd9928bfc0972f74fa487bbcdda3cf3c7abbdf99c90573aaa0e05df
        • Instruction ID: efafbc867a1af8bf84fc38356435359b146e0bdf8060357448eef8dac3d5149d
        • Opcode Fuzzy Hash: 820285ceafd9928bfc0972f74fa487bbcdda3cf3c7abbdf99c90573aaa0e05df
        • Instruction Fuzzy Hash: 552134B0518351AFEB41AF24D68475FBBE8AB51708F01882CE8D89B301D774C885DF9B
        APIs
        • al_malloc_with_context.MSIMG32 ref: 645C373E
        • al_malloc_with_context.MSIMG32 ref: 645C3773
        • _al_count_to_channel_conf.MSIMG32 ref: 645C37F0
        • _al_word_size_to_depth_conf.MSIMG32 ref: 645C37FE
        • al_create_audio_stream.MSIMG32 ref: 645C381E
          • Part of subcall function 645CACF4: al_get_channel_count.MSIMG32(?,?,?,?,?,?,00000000,?,00000000,?,645C1FF0), ref: 645CAD26
          • Part of subcall function 645CACF4: al_get_audio_depth_size.MSIMG32(?,?,?,?,?,?,00000000,?,00000000,?,645C1FF0), ref: 645CAD34
          • Part of subcall function 645CACF4: al_calloc_with_context.MSIMG32 ref: 645CAD6C
          • Part of subcall function 645CACF4: al_calloc_with_context.MSIMG32 ref: 645CAE19
          • Part of subcall function 645CACF4: al_calloc_with_context.MSIMG32 ref: 645CAE62
          • Part of subcall function 645CACF4: al_init_user_event_source.MSIMG32 ref: 645CAE97
        • al_create_thread.MSIMG32 ref: 645C3862
          • Part of subcall function 64623EA0: al_malloc_with_context.MSIMG32 ref: 64623EC3
          • Part of subcall function 64623EA0: _al_mutex_init.MSIMG32 ref: 64623EE9
          • Part of subcall function 64623EA0: _al_cond_init.MSIMG32 ref: 64623EF4
          • Part of subcall function 64623EA0: _al_thread_create.MSIMG32 ref: 64623F16
        • al_start_thread.MSIMG32 ref: 645C38BD
          • Part of subcall function 64623F9C: EnterCriticalSection.KERNEL32 ref: 64623FB5
          • Part of subcall function 64623F9C: _al_cond_broadcast.MSIMG32 ref: 64623FC8
          • Part of subcall function 64623F9C: LeaveCriticalSection.KERNEL32 ref: 64623FD7
        • al_free_with_context.MSIMG32 ref: 645C38FC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_calloc_with_contextal_malloc_with_context$CriticalSection$EnterLeave_al_cond_broadcast_al_cond_init_al_count_to_channel_conf_al_mutex_init_al_thread_create_al_word_size_to_depth_confal_create_audio_streamal_create_threadal_free_with_contextal_get_audio_depth_sizeal_get_channel_countal_init_user_event_sourceal_start_thread
        • String ID: _al_load_ogg_vorbis_audio_stream_f$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\ogg.c
        • API String ID: 481204574-2556912772
        • Opcode ID: d8b17082e7f8335b304009578dc7deea19ec060224dbdb998d404447e0a85b95
        • Instruction ID: eeebcd641500a98b95c367a418a00d58aa7fe1372d55fb829e37857bb5e61237
        • Opcode Fuzzy Hash: d8b17082e7f8335b304009578dc7deea19ec060224dbdb998d404447e0a85b95
        • Instruction Fuzzy Hash: 4F5100B00083658FD711AFA9D69939ABFE0FB95710F008A1DE8A88B780C774C844DF87
        APIs
        • al_free_with_context.MSIMG32(?,?,?,?,645C2184), ref: 646240EA
        • al_rest.MSIMG32(?,?,645C2184), ref: 64624103
        • EnterCriticalSection.KERNEL32(?,?,645C2184), ref: 6462411E
        • _al_cond_broadcast.MSIMG32(?,?,645C2184), ref: 64624131
        • LeaveCriticalSection.KERNEL32(?,?,645C2184), ref: 64624140
        • _al_mutex_destroy.MSIMG32(?,?,645C2184), ref: 6462414C
        • _al_thread_join.MSIMG32(?,?,645C2184), ref: 64624154
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\threads.c, xrefs: 646240D7
        • al_destroy_thread, xrefs: 646240CF
        • MbP?, xrefs: 646240FB
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave_al_cond_broadcast_al_mutex_destroy_al_thread_joinal_free_with_contextal_rest
        • String ID: MbP?$al_destroy_thread$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\threads.c
        • API String ID: 4008011814-3206273515
        • Opcode ID: 25e710d398545ed77b4986feec4034abfd10ff25a9462be74ade1cfd0d4916fb
        • Instruction ID: 81883f11b144ffb83e9bfc54950c2e8a4b707522409b93df95eb0320884a7d80
        • Opcode Fuzzy Hash: 25e710d398545ed77b4986feec4034abfd10ff25a9462be74ade1cfd0d4916fb
        • Instruction Fuzzy Hash: 5C115EB1508700ABEB00EF24C9C5A6B7BE8AF65708F52895DD8859B306D774C484CF57
        APIs
        • GetContextSuspended.MSIMG32 ref: 6468E48F
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 6468E4A8
        • alSourcef.MSIMG32 ref: 6468E537
        • ChannelsFromFmt.MSIMG32 ref: 6468E654
        • BytesFromFmt.MSIMG32 ref: 6468E65E
        • alSetError.MSIMG32 ref: 6468E687
        • alSetError.MSIMG32 ref: 6468E7DF
        • alSetError.MSIMG32 ref: 6468E83F
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterFromLeaveValue$BytesChannelsContextLookupSourcefSuspended
        • String ID:
        • API String ID: 2004259826-0
        • Opcode ID: 737fc826e7e3f55f5eb2608276e2136542c4386826c11c5329349c975473a201
        • Instruction ID: f8b51237e0a83582b6689d91fae9ff267a27ef2043e32261b87d15f6b27fb5e9
        • Opcode Fuzzy Hash: 737fc826e7e3f55f5eb2608276e2136542c4386826c11c5329349c975473a201
        • Instruction Fuzzy Hash: C7C18275A09396CFEB20CF18D58439EBBE0AF96704F04452ED8949B251E375D889CBB3
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6469914F
        • EnterCriticalSection.KERNEL32(00000000), ref: 64699160
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 64699189
        • TlsSetValue.KERNEL32 ref: 646991A5
        • LeaveCriticalSection.KERNEL32 ref: 646991BA
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 646991D3
        • EnterCriticalSection.KERNEL32(?,00000000,00000000), ref: 646991E0
        • LeaveCriticalSection.KERNEL32(?,?,00000000,00000000), ref: 64699201
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Leave$Enter$Value
        • String ID: :-$g-$~-
        • API String ID: 720131773-3401727152
        • Opcode ID: 891b126cef89e03d30859b521bc8d730e9edef3879ab97b9a4e00a283347e2bf
        • Instruction ID: d5be058d851e134b769645f82f9e3a3c40080be2752087ff80f3d608b2ad9388
        • Opcode Fuzzy Hash: 891b126cef89e03d30859b521bc8d730e9edef3879ab97b9a4e00a283347e2bf
        • Instruction Fuzzy Hash: B61146B0109246DEDB50AF6585D991E7BE8BB2631CFC1596CD4D4A7301D770C44C9B63
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ErrorS_set
        • String ID: Insecure filename$Invalid argument$Out of memory$irectSoundCapture
        • API String ID: 1705320395-95673110
        • Opcode ID: bc6f176a45f27f7198c6a6f7f897b5061a3b586137d03c400e42e125dfa26614
        • Instruction ID: aaa1fa2928ab594c35f66289c4fff8ee0d10b063c32b0be3998ca2c63ca15c77
        • Opcode Fuzzy Hash: bc6f176a45f27f7198c6a6f7f897b5061a3b586137d03c400e42e125dfa26614
        • Instruction Fuzzy Hash: 15918EB4E052499FDF04CFA8D4847DDBBB2FF59324F108229E860AB781D7369885CB61
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ErrorS_set
        • String ID: Insecure filename$Invalid argument$Out of memory$irectSoundCapture
        • API String ID: 1705320395-95673110
        • Opcode ID: c57c722776e9e73ef0a5c5781bbe7e5b3cb3b454258e2a57ac86db19e5a47e71
        • Instruction ID: 82a1dfcd47b7223e77cab9b5e356085e635aa16caf1c0ee4d5717fe84011f394
        • Opcode Fuzzy Hash: c57c722776e9e73ef0a5c5781bbe7e5b3cb3b454258e2a57ac86db19e5a47e71
        • Instruction Fuzzy Hash: 0A817EB1E042499FDF00CFA9D4847DEBBB2FF59314F148529D860AB741D7369885CBA1
        APIs
        • __PHYSFS_platformGrabMutex.MSIMG32 ref: 64682894
        • __PHYSFS_platformReleaseMutex.MSIMG32 ref: 64682926
        • __PHYSFS_setError.MSIMG32 ref: 646829D2
        • __PHYSFS_setError.MSIMG32 ref: 646829E8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ErrorMutexS_platformS_set$GrabRelease
        • String ID: Insecure filename$Invalid argument$Out of memory$irectSoundCapture
        • API String ID: 932224727-95673110
        • Opcode ID: cba36a6d695c289173a0914b4bdf19b08b6af0b7b9e649300089b9e563caf0b0
        • Instruction ID: b88c972a85321a289d33d75286f06e394d8a35b30ecf2fe234c6a7ca3764ec35
        • Opcode Fuzzy Hash: cba36a6d695c289173a0914b4bdf19b08b6af0b7b9e649300089b9e563caf0b0
        • Instruction Fuzzy Hash: 91719C75E092098FDF14CF6AE4806EEBBF2FF55320F148569E8A4A7381D7319845CBA1
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context$_al_balloc_al_bstrcpy
        • String ID: _al_bdestroy$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c
        • API String ID: 539564494-4073986910
        • Opcode ID: 8973b1694c1a6e944bc0606161e5e75f4d128e12cac9933b97a14601cb08231d
        • Instruction ID: 9e1c20e4e35d9c319edc2712f87114be2b698483ac6b39ec3be85a352bf0b789
        • Opcode Fuzzy Hash: 8973b1694c1a6e944bc0606161e5e75f4d128e12cac9933b97a14601cb08231d
        • Instruction Fuzzy Hash: C1613B70608741CBD728EF69C78061EBBF5AF94B55F05C92CE9988B351E331E881CB42
        APIs
        • GetContextSuspended.MSIMG32 ref: 646A541F
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646A543A
        • alSetError.MSIMG32 ref: 646A547F
        • alSetError.MSIMG32 ref: 646A553D
        • alSetError.MSIMG32 ref: 646A559F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterLeaveValue$ContextLookupSuspended
        • String ID: B`;$X94<$zT?
        • API String ID: 1516355843-2501761238
        • Opcode ID: efc9d9f8905f3fc96c167c8c29be76cb9a4ae1db48e48d054a2ca81ddbdf4857
        • Instruction ID: dc560f5b868d32c1b94dd6dae5ae80187be3aba7dfa43d4f22481f8a508e6968
        • Opcode Fuzzy Hash: efc9d9f8905f3fc96c167c8c29be76cb9a4ae1db48e48d054a2ca81ddbdf4857
        • Instruction Fuzzy Hash: EF6158B1A08B118FEB14DF18C194B5A7BA1FB92319F1685A9C4980F262C776CCC5CF86
        APIs
        • al_free_with_context.MSIMG32 ref: 646057A0
        • al_free_with_context.MSIMG32 ref: 646057D4
        • _al_balloc.MSIMG32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,64658D07), ref: 646057F9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context$_al_balloc
        • String ID: _al_bdestroy$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c
        • API String ID: 845421172-4073986910
        • Opcode ID: 04b2c790b51437380ecd03a6dd0293cd126dec1e8a128e1d64db2476d92e16c9
        • Instruction ID: bd4f0ed6c3db60a917f118a4af3eb8dda3155c98a19ba7a5abde9d89833e8c20
        • Opcode Fuzzy Hash: 04b2c790b51437380ecd03a6dd0293cd126dec1e8a128e1d64db2476d92e16c9
        • Instruction Fuzzy Hash: 58511370A087118BD728DF69D68061FFBE5BF94B24F14CA2DE8988B345D774D840CB96
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: Process$CloseCurrentHandleOpenToken
        • String ID: Out of memory
        • API String ID: 4052875653-696950042
        • Opcode ID: 6d653440c3d66242d84771bc7f7266b74169a820e12a03f535a66bd0fd24cb37
        • Instruction ID: e72b64fedf22947401c54c714c2c38aa68b457048c0ab569d762d575a0ad0eb5
        • Opcode Fuzzy Hash: 6d653440c3d66242d84771bc7f7266b74169a820e12a03f535a66bd0fd24cb37
        • Instruction Fuzzy Hash: 7C5105B0A183058EEB009F69D99879EBBF4FF59354F00992DE499D7344E738C444CBA2
        APIs
        • al_malloc_with_context.MSIMG32 ref: 6462160B
        • glGetIntegerv.OPENGL32 ref: 64621643
        • al_free_with_context.MSIMG32 ref: 646216F4
        • al_get_current_display.MSIMG32 ref: 64621704
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: Integerval_free_with_contextal_get_current_displayal_malloc_with_context
        • String ID: S$_al_ogl_create_persistent_fbo$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\opengl\ogl_display.c
        • API String ID: 436784367-406886240
        • Opcode ID: 872622f03bf37538292dfcea219571972c260a328a63b95d900a4d851b084e35
        • Instruction ID: ca6cd12a6b1b8f879303ddaf54f8c4444f063b9fa84ef392531b318eea04f89e
        • Opcode Fuzzy Hash: 872622f03bf37538292dfcea219571972c260a328a63b95d900a4d851b084e35
        • Instruction Fuzzy Hash: DB4114B05093009FE350AF68D68969EBFE0BB91344F40C92DE8DA8B345D7798894CF92
        APIs
        • __PHYSFS_setError.MSIMG32(?,?,?,?,?,?,?,?,?,?,002DD2AB,?,647FA06B,?,64681E3D), ref: 6468138D
        • __PHYSFS_setError.MSIMG32 ref: 646813A0
          • Part of subcall function 646808C4: __PHYSFS_platformGrabMutex.MSIMG32(?,?,?,64688219), ref: 646808DE
          • Part of subcall function 646808C4: __PHYSFS_platformGetThreadID.MSIMG32(?,?,?,64688219), ref: 646808ED
          • Part of subcall function 646808C4: __PHYSFS_platformReleaseMutex.MSIMG32(?,?,?,64688219), ref: 6468095C
          • Part of subcall function 646808C4: __PHYSFS_platformGetThreadID.MSIMG32 ref: 64680987
          • Part of subcall function 646808C4: __PHYSFS_platformGrabMutex.MSIMG32 ref: 6468099D
        • __PHYSFS_setError.MSIMG32(?,?,?,?,?,?,?,?,?,?,002DD2AB,?,647FA06B,?,64681E3D), ref: 646813DD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: S_platform$ErrorMutexS_set$GrabThread$Release
        • String ID: Insecure filename$Invalid argument$Out of memory$irectSoundCapture
        • API String ID: 1919294830-95673110
        • Opcode ID: 1d8a46e3795a60a912eaa59d501e9a7a41103b983b253f1e5e8e2ad6d93ededb
        • Instruction ID: d6ef2f2690c07a379bf51160851bc8018042e8cd9a73396bf526845746a2d51b
        • Opcode Fuzzy Hash: 1d8a46e3795a60a912eaa59d501e9a7a41103b983b253f1e5e8e2ad6d93ededb
        • Instruction Fuzzy Hash: 9D71BF71A082498FDB00DFA9D4A82EDBFF1BF9A310F04856DD8A5DB381D7358885CB61
        APIs
        • __PHYSFS_setError.MSIMG32 ref: 64686648
        • __PHYSFS_setError.MSIMG32(?,?,?,?,?,?,?,?,?,00000000,?,?,?,6468672D), ref: 64686669
        • __PHYSFS_setError.MSIMG32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 64686689
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ErrorS_set
        • String ID: GetModuleFileName() had no dir$Out of memory$irectSoundCapture
        • API String ID: 1705320395-2404246056
        • Opcode ID: ae800c0285b7df4bff15c502b142a8d97d9c634f4aa5b46d72bff70de656de49
        • Instruction ID: ee940fbb04ad403ca1c009fb3d7cc090f261320f9e6067f3e042e9e01da58d9b
        • Opcode Fuzzy Hash: ae800c0285b7df4bff15c502b142a8d97d9c634f4aa5b46d72bff70de656de49
        • Instruction Fuzzy Hash: 004147B16293058EE700AF69D49935EBBE1EF95350F01992DE899C7380E7758880CBA7
        APIs
        • GdipGetImageEncodersSize.GDIPLUS ref: 645D172C
        • al_malloc_with_context.MSIMG32 ref: 645D175B
        • GdipGetImageEncoders.GDIPLUS ref: 645D177D
        • al_free_with_context.MSIMG32 ref: 645D17D7
        • al_free_with_context.MSIMG32 ref: 645D1803
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: EncodersGdipImageal_free_with_context$Sizeal_malloc_with_context
        • String ID: :$GetEncoderClsid$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\image\gdiplus.cpp
        • API String ID: 3011312513-2426040358
        • Opcode ID: 3e36843a846ed5a851c6167e5284dfe5ab9bf69bcd0ccb6423fab5b51c6ba559
        • Instruction ID: 843df0b373e0c8f219dd3a57ffd0ac9da0d7b59a3af3f3bc7c4e32e94d85ee29
        • Opcode Fuzzy Hash: 3e36843a846ed5a851c6167e5284dfe5ab9bf69bcd0ccb6423fab5b51c6ba559
        • Instruction Fuzzy Hash: 982123B0A083018FD700EF29D68465BBFE5AF84368F408A2DE9989B310E734C685DF46
        APIs
          • Part of subcall function 645C3A9C: al_malloc_with_context.MSIMG32 ref: 645C3AC8
          • Part of subcall function 645C3A9C: al_fread.MSIMG32 ref: 645C3AFB
          • Part of subcall function 645C3A9C: al_free_with_context.MSIMG32 ref: 645C3B20
        • _al_count_to_channel_conf.MSIMG32 ref: 645C40D3
        • _al_word_size_to_depth_conf.MSIMG32 ref: 645C40F0
        • al_create_audio_stream.MSIMG32 ref: 645C4113
        • al_create_thread.MSIMG32 ref: 645C414A
        • al_start_thread.MSIMG32 ref: 645C419E
        Strings
        • wav_close, xrefs: 645C41B4
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\wav.c, xrefs: 645C41BC
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_count_to_channel_conf_al_word_size_to_depth_confal_create_audio_streamal_create_threadal_freadal_free_with_contextal_malloc_with_contextal_start_thread
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\wav.c$wav_close
        • API String ID: 142622304-3969514026
        • Opcode ID: fe96a049a4cf7bc525bac86ff92fc488d37df2b9b063c98fd120946c7f5b7211
        • Instruction ID: 30f1ebd062829ca825f17175b06fd819bef55f1081669fea216b735b3fb79c58
        • Opcode Fuzzy Hash: fe96a049a4cf7bc525bac86ff92fc488d37df2b9b063c98fd120946c7f5b7211
        • Instruction Fuzzy Hash: 623114B0508B059FD751EFA5D48179ABBE0ABA5704F04897DE8C88BB05E374D880AF93
        APIs
        • al_restore_state.MSIMG32 ref: 645CF0AE
          • Part of subcall function 64625FF0: __emutls_get_address.MSIMG32 ref: 64626002
        • al_lock_bitmap.MSIMG32 ref: 645CF0F6
        • al_get_bitmap_height.MSIMG32 ref: 645CF11F
        • al_get_bitmap_width.MSIMG32 ref: 645CF129
        • al_unlock_bitmap.MSIMG32 ref: 645CF164
        • al_grab_font_from_bitmap.MSIMG32 ref: 645CF187
        • al_destroy_bitmap.MSIMG32 ref: 645CF193
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: __emutls_get_addressal_destroy_bitmapal_get_bitmap_heightal_get_bitmap_widthal_grab_font_from_bitmapal_lock_bitmapal_restore_stateal_unlock_bitmap
        • String ID:
        • API String ID: 315610881-3916222277
        • Opcode ID: dc4d33f8add4228ca0a80856c34c372d4ff258fd9ac540373f589b979753b75a
        • Instruction ID: b47bdb78319968bd8e4a2fd5a6f32281e4d978c77249afb20c665c0d28d51cf8
        • Opcode Fuzzy Hash: dc4d33f8add4228ca0a80856c34c372d4ff258fd9ac540373f589b979753b75a
        • Instruction Fuzzy Hash: E521AAB16087419FE300DF68C48436EBBF0AF8A358F119C2DE59A87251D77699899F43
        APIs
        • al_calloc_with_context.MSIMG32(?,?,?,?,?,?,?,?,?,00000000,00000000,645C1ECA), ref: 645CA6E8
        • _al_kcm_register_destructor.MSIMG32(?,?,?,?,?,?,?,?,?,00000000,00000000,645C1ECA), ref: 645CA723
          • Part of subcall function 645C5E6C: _al_register_destructor.MSIMG32 ref: 645C5E87
        • _al_set_error.MSIMG32(?,?,?,?,?,?,00000000,00000000,645C1ECA), ref: 645CA743
        • _al_set_error.MSIMG32(?,?,?,?,?,?,?,?,?,00000000,00000000,645C1ECA), ref: 645CA763
        Strings
        • Out of memory allocating sample data object, xrefs: 645CA750
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\kcm_sample.c, xrefs: 645CA6C9
        • al_create_sample, xrefs: 645CA6C1
        • Invalid sample frequency, xrefs: 645CA734
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_set_error$_al_kcm_register_destructor_al_register_destructoral_calloc_with_context
        • String ID: Invalid sample frequency$Out of memory allocating sample data object$al_create_sample$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\kcm_sample.c
        • API String ID: 2013244230-2190789962
        • Opcode ID: 1e1adb6fd332f7b61a359cd129a32da9d7ca92f5e4b6c2724af12f163b65a936
        • Instruction ID: 303c0c6940d376c59b0a1591d7c906a87046ee291a9ba5839ed1fa01e3cab862
        • Opcode Fuzzy Hash: 1e1adb6fd332f7b61a359cd129a32da9d7ca92f5e4b6c2724af12f163b65a936
        • Instruction Fuzzy Hash: 2411C0B05093008FD700DFAAD184A1BBBE0BF95714F05CA5DE8984B321D7B5D945AF83
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6462474D
        • _al_vector_find_and_delete.MSIMG32 ref: 64624762
        • LeaveCriticalSection.KERNEL32 ref: 6462478A
        • _al_thread_join.MSIMG32 ref: 64624797
        • al_free_with_context.MSIMG32 ref: 646247B7
        Strings
        • al_stop_timer, xrefs: 6462479C
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\timernu.c, xrefs: 646247A4
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave_al_thread_join_al_vector_find_and_deleteal_free_with_context
        • String ID: al_stop_timer$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\timernu.c
        • API String ID: 1930593762-999816394
        • Opcode ID: dfc047c5523bb95f66f3f69210d65f3520754fed430666b02a0e3118d6a574c5
        • Instruction ID: 90a7b781495d5ee31967f0ace6f858977f27c90cac318272cfe482cc926ec5c1
        • Opcode Fuzzy Hash: dfc047c5523bb95f66f3f69210d65f3520754fed430666b02a0e3118d6a574c5
        • Instruction Fuzzy Hash: 84111BB02183409FEB04AF64C68475EBBE8BB56708F45896CE4E88B341D778C445DF57
        APIs
        • _al_kcm_unregister_destructor.MSIMG32(?,?,?,?,00000000,645CACD1,?,?,?,?,?,645C45E9), ref: 645CC4D7
          • Part of subcall function 645C5E90: _al_unregister_destructor.MSIMG32(?,?,?,?,?,?,645C93B8,?,?,?,?,00000000,645CACC4), ref: 645C5EA3
        • al_detach_voice.MSIMG32(?,?,?,?,00000000,645CACD1,?,?,?,?,?,645C45E9), ref: 645CC4DF
          • Part of subcall function 645CC418: al_lock_mutex.MSIMG32(?,?,?,?,645CC4E4,?,?,?,?,00000000,645CACD1), ref: 645CC432
          • Part of subcall function 645CC418: _al_kcm_stream_set_mutex.MSIMG32 ref: 645CC454
        • al_destroy_mutex.MSIMG32(?,?,?,?,00000000,645CACD1,?,?,?,?,?,645C45E9), ref: 645CC4F3
          • Part of subcall function 64624234: _al_mutex_destroy.MSIMG32(?,?,?,?,?,645CC4F8,?,?,?,?,00000000,645CACD1), ref: 64624243
          • Part of subcall function 64624234: al_free_with_context.MSIMG32 ref: 64624263
        • al_destroy_cond.MSIMG32(?,?,?,?,00000000,645CACD1,?,?,?,?,?,645C45E9), ref: 645CC4FE
          • Part of subcall function 646242B0: _al_cond_destroy.MSIMG32(?,?,?,?,?,645CC503,?,?,?,?,00000000,645CACD1), ref: 646242BF
          • Part of subcall function 646242B0: al_free_with_context.MSIMG32 ref: 646242DF
        • al_free_with_context.MSIMG32 ref: 645CC51E
        Strings
        • al_destroy_voice, xrefs: 645CC503
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\kcm_voice.c, xrefs: 645CC50B
        • p, xrefs: 645CC513
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context$_al_cond_destroy_al_kcm_stream_set_mutex_al_kcm_unregister_destructor_al_mutex_destroy_al_unregister_destructoral_destroy_condal_destroy_mutexal_detach_voiceal_lock_mutex
        • String ID: al_destroy_voice$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\kcm_voice.c$p
        • API String ID: 88559167-406518065
        • Opcode ID: e53b2766d28e3b850a50c4d0d7898bbe307e88b28f4aba850f88726de295933a
        • Instruction ID: b8eb90c94d26b7fe84a46093f33590494703bf450e03eb39e6c321abba596dd5
        • Opcode Fuzzy Hash: e53b2766d28e3b850a50c4d0d7898bbe307e88b28f4aba850f88726de295933a
        • Instruction Fuzzy Hash: 82F0D4B45087008BDB00AFA4D5C462EBBE4BF44304F429D9CE8C54B302C738D4409F82
        APIs
        • _al_d3d_render_to_texture_supported.MSIMG32 ref: 6465A627
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_d3d_render_to_texture_supported
        • String ID:
        • API String ID: 1071710470-0
        • Opcode ID: 3547df95fe8c8a8a341917f7f8f3c4676ee7dd5d6ee42acef8720c441dfce262
        • Instruction ID: 78dc3d21b77f156c1a93da6eff25f1ddeb144187aba74d875e0a10498758577f
        • Opcode Fuzzy Hash: 3547df95fe8c8a8a341917f7f8f3c4676ee7dd5d6ee42acef8720c441dfce262
        • Instruction Fuzzy Hash: D49187B49097409FC708CF19C18064AFBE1BFC8354F50896EE8988B365E775E984CF96
        APIs
        • GetContextSuspended.MSIMG32 ref: 646A67F7
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646A6810
        • alSetError.MSIMG32 ref: 646A682D
        • GetContextSuspended.MSIMG32 ref: 646A684B
        • LookupUIntMapKey.MSIMG32 ref: 646A6860
        • alSetError.MSIMG32 ref: 646A689B
        • ProcessContext.MSIMG32 ref: 646A68A3
        • alSetError.MSIMG32 ref: 646A68CB
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$ContextError$EnterLeaveLookupSuspendedValue$Process
        • String ID:
        • API String ID: 3328862149-0
        • Opcode ID: 8b4da7f75d89409f7b918950dcdc69895b17264c2de2d927e691cf76f049505a
        • Instruction ID: 588c99cf1419cfbd54489fe31220814f0b8c8a59221f9bf4f4ed427d24bf4976
        • Opcode Fuzzy Hash: 8b4da7f75d89409f7b918950dcdc69895b17264c2de2d927e691cf76f049505a
        • Instruction Fuzzy Hash: C921E571608702CBE7006F28D9845AEBBE8EFC2354F01582ED9C547341D776C899CBA7
        APIs
        • al_attach_sample_instance_to_mixer.MSIMG32 ref: 645CA7B1
        • _al_vector_ref.MSIMG32 ref: 645CA7D2
        • _al_vector_ref.MSIMG32 ref: 645CA7E4
        • al_destroy_sample_instance.MSIMG32 ref: 645CA7F4
          • Part of subcall function 645C62A4: _al_kcm_unregister_destructor.MSIMG32(?,?,?,?,00000000,645CAC96,?,?,?,?,?,645C45E9), ref: 645C62B3
          • Part of subcall function 645C62A4: _al_kcm_detach_from_parent.MSIMG32(?,?,?,?,00000000,645CAC96,?,?,?,?,?,645C45E9), ref: 645C62BB
        • al_create_sample_instance.MSIMG32 ref: 645CA800
          • Part of subcall function 645C62D4: al_calloc_with_context.MSIMG32 ref: 645C6305
          • Part of subcall function 645C62D4: _al_kcm_register_destructor.MSIMG32 ref: 645C63BD
        • _al_vector_ref.MSIMG32 ref: 645CA823
        • al_destroy_sample_instance.MSIMG32 ref: 645CA82D
        • _al_vector_free.MSIMG32 ref: 645CA842
        • _al_vector_free.MSIMG32 ref: 645CA84E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_vector_ref$_al_vector_freeal_destroy_sample_instance$_al_kcm_detach_from_parent_al_kcm_register_destructor_al_kcm_unregister_destructoral_attach_sample_instance_to_mixeral_calloc_with_contextal_create_sample_instance
        • String ID:
        • API String ID: 868697633-0
        • Opcode ID: 6483beae2a49b4504eef952b7cc8b4b71f5ef67cd8bf15053b4a18f838c92e7c
        • Instruction ID: f74092b421134fbeef777342442fad9c7ba9a898531565019310fe3f712aa700
        • Opcode Fuzzy Hash: 6483beae2a49b4504eef952b7cc8b4b71f5ef67cd8bf15053b4a18f838c92e7c
        • Instruction Fuzzy Hash: 4B2106B0A183018FEB40EFA4929465EBBE0FF96B48F55992CD1D887300E7358885EB57
        APIs
        • EnterCriticalSection.KERNEL32 ref: 64699073
        • EnterCriticalSection.KERNEL32(00000000), ref: 64699080
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 646990A9
        • LeaveCriticalSection.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 646990CF
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 646990E3
        • EnterCriticalSection.KERNEL32(00000000,00000000,00000000), ref: 646990F0
        • LeaveCriticalSection.KERNEL32(00000000,00000000,00000000,00000000), ref: 64699107
        • LeaveCriticalSection.KERNEL32(00000000,00000000,00000000,00000000), ref: 64699131
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Leave$Enter
        • String ID: :-
        • API String ID: 2978645861-2031694841
        • Opcode ID: d553cd6e6e2c8bd16b508bde1e29e189fcb4e909ca3a6ae21ed7d1401d1e4149
        • Instruction ID: 72bdd6487e29e25fcd268ad42f060cc30d8758ac5c89de56f92a97dda44f8d2d
        • Opcode Fuzzy Hash: d553cd6e6e2c8bd16b508bde1e29e189fcb4e909ca3a6ae21ed7d1401d1e4149
        • Instruction Fuzzy Hash: D41121B0109206EEEB51AF6484D9A5E7BE4AF3631CF8119ADD4A4A7301D775D08CCB23
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6469978B
        • EnterCriticalSection.KERNEL32(00000000), ref: 64699798
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 646997C1
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 646997E3
        • EnterCriticalSection.KERNEL32(00000000,00000000,00000000), ref: 646997F0
        • LeaveCriticalSection.KERNEL32(00000000,00000000,00000000,00000000), ref: 64699807
        • LeaveCriticalSection.KERNEL32(00000000,00000000,00000000,00000000), ref: 64699831
        • LeaveCriticalSection.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 64699845
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Leave$Enter
        • String ID: :-
        • API String ID: 2978645861-2031694841
        • Opcode ID: 9adedc2c160b4eed5353a3d2517b3beedbde19aa452c9b8a06cc4bde7b1e9803
        • Instruction ID: 6807a91c4bd7709b8f73828df0c10da4f5bfddd7748c1a13e0d4c12b2b1c5b2e
        • Opcode Fuzzy Hash: 9adedc2c160b4eed5353a3d2517b3beedbde19aa452c9b8a06cc4bde7b1e9803
        • Instruction Fuzzy Hash: F6114FB0209206DEE760AF648595A1E3BE8AB2631CFC519ADD494AA301DB75D08C8F23
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6469A5AB
        • EnterCriticalSection.KERNEL32(00000000), ref: 6469A5B8
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 6469A5E1
        • LeaveCriticalSection.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 6469A5F8
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 6469A60F
        • EnterCriticalSection.KERNEL32(?,00000000,00000000), ref: 6469A61C
        • LeaveCriticalSection.KERNEL32(00000000,?,00000000,00000000), ref: 6469A63C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Leave$Enter
        • String ID: :-$~-
        • API String ID: 2978645861-2644123043
        • Opcode ID: a1169fce780838fa713408c75ad0e2c721ab948e97409b7715c29458c3fbd023
        • Instruction ID: 2463adf9d323e8e23635eaad89391b42e9ca26cfd9825bc1009b9b72aa1841e7
        • Opcode Fuzzy Hash: a1169fce780838fa713408c75ad0e2c721ab948e97409b7715c29458c3fbd023
        • Instruction Fuzzy Hash: 9901EDB07092469FD790EF6985D9E1E77E8AB29218FC16968E4D4E7301DB70D48C8B23
        APIs
        • ov_open_callbacks.MSIMG32 ref: 645C3520
        • al_malloc_with_context.MSIMG32 ref: 645C358D
        • _al_count_to_channel_conf.MSIMG32 ref: 645C3602
        • _al_word_size_to_depth_conf.MSIMG32 ref: 645C3610
        • al_create_sample.MSIMG32 ref: 645C3638
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\ogg.c, xrefs: 645C357A, 645C3664
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_count_to_channel_conf_al_word_size_to_depth_confal_create_sampleal_malloc_with_contextov_open_callbacks
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\ogg.c
        • API String ID: 4103308943-2603835114
        • Opcode ID: affe482a0ae41d0ab7bc66e035e82a2ff17c66be869981347f9b5beb729b19d9
        • Instruction ID: 3b7a9125db74275e2ad79cf3a961d340a6ad51e61ab58ef6bc8c014c1b52b495
        • Opcode Fuzzy Hash: affe482a0ae41d0ab7bc66e035e82a2ff17c66be869981347f9b5beb729b19d9
        • Instruction Fuzzy Hash: F5510EB41083659FE701EFA5D69825ABFE4FB89358F008A2DE4988B780D374C585DF87
        APIs
        • al_free_with_context.MSIMG32 ref: 64609093
        • al_free_with_context.MSIMG32 ref: 646090C7
        • al_free_with_context.MSIMG32 ref: 64609113
        • al_free_with_context.MSIMG32 ref: 6460913A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context
        • String ID: _al_bdestroy$_al_bstrListDestroy$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c
        • API String ID: 3891110267-2776418772
        • Opcode ID: 26be1b7f32a3e5940ba9f52f0cc517671d08a7995cb682b3cb816ecd0f9563ca
        • Instruction ID: 02b9d5703a617d4d940e3701c7df5f0e096e6d9ef20ce474f3114b7c8291013f
        • Opcode Fuzzy Hash: 26be1b7f32a3e5940ba9f52f0cc517671d08a7995cb682b3cb816ecd0f9563ca
        • Instruction Fuzzy Hash: 243107B0605702DBE7159F15D68071AFBA2FF91B18F11CA1CE1A94B784C335E48ACF82
        APIs
        • al_malloc_with_context.MSIMG32 ref: 6460975C
        • al_malloc_with_context.MSIMG32 ref: 64609791
        • al_free_with_context.MSIMG32 ref: 646097FF
          • Part of subcall function 6460488C: al_realloc_with_context.MSIMG32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,646097BE), ref: 6460493D
          • Part of subcall function 6460488C: _al_blk2bstr.MSIMG32 ref: 6460499D
        • _al_bstrListDestroy.MSIMG32 ref: 646097D3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context$DestroyList_al_blk2bstr_al_bstral_free_with_contextal_realloc_with_context
        • String ID: _al_bsplit$d$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c
        • API String ID: 2019787591-580047089
        • Opcode ID: ae9c75e00e2663fe9034f11385e600cdbccc4a4e28db68620f9362904cc35485
        • Instruction ID: 05e9c2c2d94e62a621fd889d114d500dc4e288f003ab6ecb9918a84f729119e9
        • Opcode Fuzzy Hash: ae9c75e00e2663fe9034f11385e600cdbccc4a4e28db68620f9362904cc35485
        • Instruction Fuzzy Hash: 772147B6609301CFE718CF25D68076ABBE5AF91B58F05C92DE4988B345D334C888DB53
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context$_al_vector_free_al_vector_ref
        • String ID: Z$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\kcm_instance.c$stream_free
        • API String ID: 2480609427-2598952541
        • Opcode ID: 0657c705081dcc619bf29eabf46b6f840c3861b7cef9b0ffe102e369f4f0f3f7
        • Instruction ID: 6c35204fb0a559a366bd2074a32e2cc6673d0c9194cf1ae216423eb15612bde4
        • Opcode Fuzzy Hash: 0657c705081dcc619bf29eabf46b6f840c3861b7cef9b0ffe102e369f4f0f3f7
        • Instruction Fuzzy Hash: 211148B0108B408EE711AF64D684B6ABBE0EF80704F00D95DE09DAB242D734D544EF57
        APIs
        • al_lock_mutex.MSIMG32 ref: 645C655E
          • Part of subcall function 646241FC: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,645C6454), ref: 6462420C
        • al_unlock_mutex.MSIMG32 ref: 645C6581
          • Part of subcall function 64624218: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,645C6454), ref: 64624228
        • al_set_voice_playing.MSIMG32 ref: 645C659B
        • _al_set_error.MSIMG32 ref: 645C65CF
        • _al_set_error.MSIMG32 ref: 645C65E7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection_al_set_error$EnterLeaveal_lock_mutexal_set_voice_playingal_unlock_mutex
        • String ID: Sample has no data$Sample has no parent
        • API String ID: 4017192464-3856121315
        • Opcode ID: a1cb93d5d10784607f6539c84152cb6a69064921c1776071c2001fd084ef944a
        • Instruction ID: c997a7fb5d609e4e45ca31fe0e6b1099aefaa4c21e4785038d2a9514e9fc21c2
        • Opcode Fuzzy Hash: a1cb93d5d10784607f6539c84152cb6a69064921c1776071c2001fd084ef944a
        • Instruction Fuzzy Hash: B6113CB06043009EEB009FB4848476A77E46B62204F9998ACDC8C5F34AE775C544ABA3
        APIs
        • al_lock_mutex.MSIMG32 ref: 645C64A6
          • Part of subcall function 646241FC: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,645C6454), ref: 6462420C
        • al_unlock_mutex.MSIMG32 ref: 645C64BF
          • Part of subcall function 64624218: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,645C6454), ref: 64624228
        • al_set_voice_playing.MSIMG32 ref: 645C64D7
        • _al_set_error.MSIMG32 ref: 645C6503
        • _al_set_error.MSIMG32 ref: 645C651B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection_al_set_error$EnterLeaveal_lock_mutexal_set_voice_playingal_unlock_mutex
        • String ID: Sample has no data$Sample has no parent
        • API String ID: 4017192464-3856121315
        • Opcode ID: 8c81e4c1a9d3670fe94a6ce5a422845ed849ea5fdf6f4e4bcdcc86975c8d4643
        • Instruction ID: f5416118011f99139fe70bc53ccbf5814f1189bc876857c98a5bf910051eb8e1
        • Opcode Fuzzy Hash: 8c81e4c1a9d3670fe94a6ce5a422845ed849ea5fdf6f4e4bcdcc86975c8d4643
        • Instruction Fuzzy Hash: B41117B06053409AEB00AFB885C576977D46F51304F4858ACDC8C9F342E776D584EB63
        APIs
        • al_get_new_file_interface.MSIMG32 ref: 645FF599
          • Part of subcall function 64626290: __emutls_get_address.MSIMG32(?,?,?,?,645FF59E), ref: 6462629C
        • al_malloc_with_context.MSIMG32(?,?,?,?,?,?,645C1F54), ref: 645FF5C5
        • al_set_errno.MSIMG32(?,?,?,?,?,?,645C1F54), ref: 645FF603
        • al_free_with_context.MSIMG32(?,?,?,?,?,?,645C1F54), ref: 645FF62B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: __emutls_get_addressal_free_with_contextal_get_new_file_interfaceal_malloc_with_contextal_set_errno
        • String ID: 3$al_fopen_interface$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\file.c
        • API String ID: 2632256726-3238006543
        • Opcode ID: bf1b038792944079f878072c2c85357ece34146228293767a8ceaec21bf8c2b8
        • Instruction ID: fd965a2951e9dede70e1eeb57e7c1864b99e67a659ed82d186ed5520e7454543
        • Opcode Fuzzy Hash: bf1b038792944079f878072c2c85357ece34146228293767a8ceaec21bf8c2b8
        • Instruction Fuzzy Hash: 40014CB02083019FE741AF68D68471ABBE0AF44314F11896DE8888B340D774D441DF67
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6462469D
        • _al_vector_alloc_back.MSIMG32 ref: 646246BD
        • LeaveCriticalSection.KERNEL32 ref: 646246D6
        • al_malloc_with_context.MSIMG32 ref: 64624703
        • _al_thread_create.MSIMG32 ref: 64624725
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\timernu.c, xrefs: 646246EC
        • al_start_timer, xrefs: 646246E4
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave_al_thread_create_al_vector_alloc_backal_malloc_with_context
        • String ID: al_start_timer$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\timernu.c
        • API String ID: 2738339651-3916641779
        • Opcode ID: 2774270b95775e76cb4cd5f68954d1d4431e2e9d76bd4b1ee0d3f6095c357d4a
        • Instruction ID: 27bea70490656b405c2368baea55051da4487f3d6c86dec8e3859edde17150be
        • Opcode Fuzzy Hash: 2774270b95775e76cb4cd5f68954d1d4431e2e9d76bd4b1ee0d3f6095c357d4a
        • Instruction Fuzzy Hash: 07111BB0608344DFEB40AF64C58875A7BE4BB55704F4488ACD9C88B341D7798494DF67
        APIs
        • _ve_envelope_clear.MSIMG32(?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6471F065
          • Part of subcall function 64727790: mdct_clear.MSIMG32(?,?,?,?,6471F06A,?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6472779F
        • mdct_clear.MSIMG32(?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6471F080
        • mdct_clear.MSIMG32(?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6471F0A9
        • _vp_psy_clear.MSIMG32(?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6471F15D
        • _vp_global_free.MSIMG32(?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6471F180
        • vorbis_bitrate_clear.MSIMG32(?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6471F18B
        • drft_clear.MSIMG32(?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6471F196
        • drft_clear.MSIMG32(?,?,?,?,?,?,?,?,?,?,6471BA1E), ref: 6471F1A1
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: mdct_clear$drft_clear$_ve_envelope_clear_vp_global_free_vp_psy_clearvorbis_bitrate_clear
        • String ID:
        • API String ID: 2338102968-0
        • Opcode ID: d21255bdc10205f20b1c0e8a097a2b4ef1f141b4740e0a5ab482f3e36c21c6e6
        • Instruction ID: db1d6089747d0e63d4786953decb49b341d3768fb901868d9b0ec1498b628a67
        • Opcode Fuzzy Hash: d21255bdc10205f20b1c0e8a097a2b4ef1f141b4740e0a5ab482f3e36c21c6e6
        • Instruction Fuzzy Hash: C8710578608B418FEB14EF65C6C4A2AB7F2FF85604B158A2CC9D58B714DB31F942DB81
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_set_errno$al_get_errno
        • String ID:
        • API String ID: 517874856-0
        • Opcode ID: 523e6d7e5988bd0a4757c6649e0c70e83378e232a554c0a894b3eef9b68625ec
        • Instruction ID: 51b57bb7ed058ee8dec8a140b132b7628b7bd230447421c628165028acaf2788
        • Opcode Fuzzy Hash: 523e6d7e5988bd0a4757c6649e0c70e83378e232a554c0a894b3eef9b68625ec
        • Instruction Fuzzy Hash: 61412471B0C2029BE75E6F58DB443DB77A4EF82B90F119929D890572D4EB34CC858B8A
        APIs
        • GetContextSuspended.MSIMG32 ref: 6468F76B
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 6468F788
        • alGetSourcei.MSIMG32 ref: 6468F7CF
        • ProcessContext.MSIMG32 ref: 6468F7D7
        • alSetError.MSIMG32 ref: 6468F827
        • alSetError.MSIMG32 ref: 6468F8E7
        • alSetError.MSIMG32 ref: 6468F953
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$ContextEnterLeaveValue$LookupProcessSourceiSuspended
        • String ID:
        • API String ID: 4105881591-0
        • Opcode ID: 206cc4cc1f6e49bc7c215a309cd8e327e175cc87fa3579e3f686b16ec8900b05
        • Instruction ID: 61e278167b2915494ab26888f5e6e3c0c0f48e8b1051c984a283ae4a56ee7c39
        • Opcode Fuzzy Hash: 206cc4cc1f6e49bc7c215a309cd8e327e175cc87fa3579e3f686b16ec8900b05
        • Instruction Fuzzy Hash: 12418C70A083049EE708AF19D18029EB7F3BF99714F41892EE4D887294D37989D5CB6B
        APIs
        • GetContextSuspended.MSIMG32 ref: 6469881B
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 6469884D
        • alSetError.MSIMG32 ref: 6469887A
        • alSetError.MSIMG32 ref: 6469892B
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 65270113-0
        • Opcode ID: 3e4803054498152b0bca268a620cdc80c9afd25d844c939d679dfe534be82d70
        • Instruction ID: e5679ce3ec96ca33cdc900f61b8cfd3c2e760f2621a19ecd60b2abcd8c252ffe
        • Opcode Fuzzy Hash: 3e4803054498152b0bca268a620cdc80c9afd25d844c939d679dfe534be82d70
        • Instruction Fuzzy Hash: 024117756183028FD700DF29C68061EBBE0FF99798F04492EE9889B321D7B5D845DB97
        APIs
        • GetContextSuspended.MSIMG32 ref: 6468F0FF
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 6468F11C
        • alGetSourcef.MSIMG32 ref: 6468F15F
        • ProcessContext.MSIMG32 ref: 6468F167
        • alGetSource3f.MSIMG32 ref: 6468F1AD
        • alSetError.MSIMG32 ref: 6468F1D3
        • alSetError.MSIMG32 ref: 6468F233
        • alSetError.MSIMG32 ref: 6468F26F
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$ContextEnterLeaveValue$LookupProcessSource3fSourcefSuspended
        • String ID:
        • API String ID: 2269007991-0
        • Opcode ID: 9b39fb4610e86d76dda3ca929290727c65897f3ff4b8b3a840775c86acf5671a
        • Instruction ID: 9a49e9864aff9e4de87270d6e0387365e521595b657e373202593a344493eefb
        • Opcode Fuzzy Hash: 9b39fb4610e86d76dda3ca929290727c65897f3ff4b8b3a840775c86acf5671a
        • Instruction Fuzzy Hash: AE415A71A08344DFE7049F59C1C069EBBE6BF8A714F01896EE4C887240D778D599CB6B
        APIs
        • InterlockedIncrement.KERNEL32 ref: 6468C7F5
        • InterlockedDecrement.KERNEL32 ref: 6468C81D
        • ReleaseSemaphore.KERNEL32 ref: 6468C83F
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: Interlocked$DecrementIncrementReleaseSemaphore
        • String ID:
        • API String ID: 2723166867-0
        • Opcode ID: 96b2c4c63cfd44d92206f450387d056d4e13820f6d3a8d9c172c108163361e15
        • Instruction ID: 57ff0cca69f315a3ae0912699707af5bc1f4c5637564e1e76d0ce86546c99eaa
        • Opcode Fuzzy Hash: 96b2c4c63cfd44d92206f450387d056d4e13820f6d3a8d9c172c108163361e15
        • Instruction Fuzzy Hash: 453180B0A083058FEB40EF29C59971A7BF8EB56324F00866DD8949B395E334D044DFA3
        APIs
        • GetContextSuspended.MSIMG32 ref: 646A5707
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646A5722
        • alSetError.MSIMG32 ref: 646A575E
        • alEffecti.MSIMG32 ref: 646A5793
        • alEffecti.MSIMG32 ref: 646A57B2
        • alEffecti.MSIMG32 ref: 646A57D3
        • alEffecti.MSIMG32 ref: 646A57EE
        • alSetError.MSIMG32 ref: 646A580F
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalEffectiSection$EnterErrorLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 1306911495-0
        • Opcode ID: 7529d5019de1abf019a5b921a1b0f39f70ec520cc868f261e130d9cdad90a8f4
        • Instruction ID: 30d1743f6365d49b7c3d8c4dd1332951fdd7d2ac4f156f9a2d989670d70f1230
        • Opcode Fuzzy Hash: 7529d5019de1abf019a5b921a1b0f39f70ec520cc868f261e130d9cdad90a8f4
        • Instruction Fuzzy Hash: 51314875608B51DBE700EF18D4C06AEBBE4FB91354F14882EE8889B212D775DC85CB9A
        APIs
        • GetContextSuspended.MSIMG32 ref: 646A74AB
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646A74CA
        • GetContextSuspended.MSIMG32 ref: 646A74D3
        • LookupUIntMapKey.MSIMG32 ref: 646A74EE
        • alSetError.MSIMG32 ref: 646A7507
        • ProcessContext.MSIMG32 ref: 646A750F
        • alSetError.MSIMG32 ref: 646A754F
        • alSetError.MSIMG32 ref: 646A757B
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$ContextError$EnterLeaveLookupSuspendedValue$Process
        • String ID:
        • API String ID: 3328862149-0
        • Opcode ID: c6d92cba03a81536ea2256a11e41ef27028e3436782e542167135ceea83c8c4f
        • Instruction ID: cb52ae08ef95ae311a3ae287e26d795c36f90accf84437fd5d43c212cf573afb
        • Opcode Fuzzy Hash: c6d92cba03a81536ea2256a11e41ef27028e3436782e542167135ceea83c8c4f
        • Instruction Fuzzy Hash: 0B214FB16087028FD700AF29D48455EBBF0EF82359F05486EE9848B311DB75DC95DB96
        APIs
        • al_get_current_display.MSIMG32 ref: 645FB6E4
          • Part of subcall function 64625244: __emutls_get_address.MSIMG32(?,?,00000000,?,645FB784,?,?,6462691A), ref: 64625250
        • al_get_current_transform.MSIMG32 ref: 645FB71F
        • al_use_transform.MSIMG32 ref: 645FB727
        • al_get_current_transform.MSIMG32 ref: 645FB738
        • al_copy_transform.MSIMG32 ref: 645FB748
        • al_identity_transform.MSIMG32 ref: 645FB754
        • al_use_transform.MSIMG32 ref: 645FB75C
        • al_use_transform.MSIMG32 ref: 645FB76B
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_use_transform$al_get_current_transform$__emutls_get_addressal_copy_transformal_get_current_displayal_identity_transform
        • String ID:
        • API String ID: 1619067368-0
        • Opcode ID: dce76539f2edd4dc86eaea921814819f86037d2c258329faeeb118805f867628
        • Instruction ID: a1058f9028e8ff204ecb1c25ca6773773e5abb91d4f7196462e90cdd1ecf5395
        • Opcode Fuzzy Hash: dce76539f2edd4dc86eaea921814819f86037d2c258329faeeb118805f867628
        • Instruction Fuzzy Hash: AB01AD719093909FE7226B34B4843AFBBD0AF91318F4505BAD8D40B252DB394085CB9B
        APIs
        • __PHYSFS_initSmallAlloc.MSIMG32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,64687949), ref: 646877CD
        • PHYSFS_utf8FromUcs2.MSIMG32 ref: 64687864
        • __PHYSFS_smallFree.MSIMG32 ref: 6468789B
        • __PHYSFS_setError.MSIMG32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,64687949), ref: 646878EB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: AllocErrorFreeFromS_initS_setS_smallS_utf8SmallUcs2
        • String ID: Out of memory
        • API String ID: 1887214166-696950042
        • Opcode ID: 02522474011c869d53438d4c5203429a7f279189be81d88ceb0aaa96566b869c
        • Instruction ID: 9011f64c7bc3e15c8c45df91caa7640e85664d9d90e6cc3a82928fe19e663c10
        • Opcode Fuzzy Hash: 02522474011c869d53438d4c5203429a7f279189be81d88ceb0aaa96566b869c
        • Instruction Fuzzy Hash: C84159B1A083098ED704AF78C8857AEBBF1FF95311F10893DE09987390E7789044CBA2
        APIs
        • al_malloc_with_context.MSIMG32 ref: 6460478D
        • al_malloc_with_context.MSIMG32 ref: 646047F7
        • al_malloc_with_context.MSIMG32 ref: 6460487C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context
        • String ID: _al_blk2bstr$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c
        • API String ID: 1952898122-3285517334
        • Opcode ID: cd6ac7c0952d5c3e0c5a2b7b50f9205084b77d815b2dc9581a93b42de27f7f7e
        • Instruction ID: ac892be43b0a21e3556144c7337a2934d3dbb40c5968261feba2f270616ee3c9
        • Opcode Fuzzy Hash: cd6ac7c0952d5c3e0c5a2b7b50f9205084b77d815b2dc9581a93b42de27f7f7e
        • Instruction Fuzzy Hash: CF3193B0B083418BE7198F59D64132EBBE2ABD1700F15CA6CD4D98F744DBB4D8418B57
        APIs
        • al_lock_mutex.MSIMG32 ref: 645C67E8
          • Part of subcall function 646241FC: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,645C6454), ref: 6462420C
        • al_unlock_mutex.MSIMG32 ref: 645C6869
        • _al_set_error.MSIMG32 ref: 645C6899
        • _al_set_error.MSIMG32 ref: 645C68CD
        Strings
        • Could not set voice playback speed, xrefs: 645C68BE
        • Attempted to set zero speed, xrefs: 645C688A
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_set_error$CriticalEnterSectional_lock_mutexal_unlock_mutex
        • String ID: Attempted to set zero speed$Could not set voice playback speed
        • API String ID: 1817510636-3151016178
        • Opcode ID: 9802c7040a6e2d86312d3bf70c7733a1b265df04cbf26391fb5a02bb825cd7cf
        • Instruction ID: 6aff644f31a81e1966f9f48b41090ae4753119600c7064a8c95d4f9e4981ca0a
        • Opcode Fuzzy Hash: 9802c7040a6e2d86312d3bf70c7733a1b265df04cbf26391fb5a02bb825cd7cf
        • Instruction Fuzzy Hash: E631ADB4A0D3028BDB009F91E8807A67BE0FF85350F4559BDEC985A349E33189959FA3
        APIs
        • ov_open_callbacks.MSIMG32 ref: 645C3520
        • al_malloc_with_context.MSIMG32 ref: 645C358D
        • _al_count_to_channel_conf.MSIMG32 ref: 645C3602
        • _al_word_size_to_depth_conf.MSIMG32 ref: 645C3610
        • al_create_sample.MSIMG32 ref: 645C3638
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\ogg.c, xrefs: 645C357A
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_count_to_channel_conf_al_word_size_to_depth_confal_create_sampleal_malloc_with_contextov_open_callbacks
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\ogg.c
        • API String ID: 4103308943-2603835114
        • Opcode ID: 48fefe24730289fb7770c7a87ac4bf6132f53898f9bf32f08b070b769f45550d
        • Instruction ID: 7539503e41691184be5a67cac3e3b2416664df80e04bd1f35b396180ebcd2001
        • Opcode Fuzzy Hash: 48fefe24730289fb7770c7a87ac4bf6132f53898f9bf32f08b070b769f45550d
        • Instruction Fuzzy Hash: 63311FB40087608FD700AF65D69925EBFE0FB99314F018A2DE9988B380D334C945DF87
        APIs
        • __PHYSFS_initSmallAlloc.MSIMG32 ref: 6468852A
        • PHYSFS_utf8ToUcs2.MSIMG32 ref: 6468854C
        • __PHYSFS_smallFree.MSIMG32(?), ref: 64688578
        • __PHYSFS_setError.MSIMG32 ref: 646885C7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: AllocErrorFreeS_initS_setS_smallS_utf8SmallUcs2
        • String ID: Out of memory
        • API String ID: 2087461672-696950042
        • Opcode ID: 1b6b8e492b4437da10cfecea7a82fc56cb44e43dfb778fa7e5c0c567f87f37c3
        • Instruction ID: 06e106d196bd1116756ec52f2d2494958e25a85e9ec35800343b2966cbe5d0a9
        • Opcode Fuzzy Hash: 1b6b8e492b4437da10cfecea7a82fc56cb44e43dfb778fa7e5c0c567f87f37c3
        • Instruction Fuzzy Hash: 0E21D7729097059FDB40AF79D88459EBBF4EF42364F01492DE554C7290E730D440CBA3
        APIs
        • al_fopen.MSIMG32 ref: 645C26AD
          • Part of subcall function 645FF594: al_get_new_file_interface.MSIMG32 ref: 645FF599
          • Part of subcall function 645FF594: al_malloc_with_context.MSIMG32(?,?,?,?,?,?,645C1F54), ref: 645FF5C5
        • _al_add_exit_func.MSIMG32 ref: 645C26D8
          • Part of subcall function 645FF32C: al_malloc_with_context.MSIMG32(?,?,?,?,?,?,?,645C49EF,?,?,?,?,?,?,645C1275), ref: 645FF36F
        • register_dumbfile_system.MSIMG32 ref: 645C2799
        • al_fclose.MSIMG32 ref: 645C27FB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context$_al_add_exit_funcal_fcloseal_fopenal_get_new_file_interfaceregister_dumbfile_system
        • String ID: Xl$shutdown_libdumb
        • API String ID: 2861647191-4230594647
        • Opcode ID: 0a2f5e75dcadabb27014b1af7f680ceb0446674dc3bbe4e9ccf8eb4584979bd1
        • Instruction ID: d4f745552542d5e535cf6636909608702d92f0db1f3d6398d62317f1563d79fb
        • Opcode Fuzzy Hash: 0a2f5e75dcadabb27014b1af7f680ceb0446674dc3bbe4e9ccf8eb4584979bd1
        • Instruction Fuzzy Hash: A631D0B490D2B08ADB12EF64A6BA79E7FA0E762344F40291DE5448BB01C731C844EF93
        APIs
        • WideCharToMultiByte.KERNEL32 ref: 64669759
        • al_malloc_with_context.MSIMG32 ref: 64669786
        • WideCharToMultiByte.KERNEL32 ref: 646697C4
        • al_free_with_context.MSIMG32 ref: 646697F7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ByteCharMultiWide$al_free_with_contextal_malloc_with_context
        • String ID: ?$_al_win_utf8
        • API String ID: 2230065822-3254848808
        • Opcode ID: b3c11de906062f1a3d35c1d8a6cddde61ad6a28a78d8f692965bff427d6df6d0
        • Instruction ID: 16a7686b4b29bf26aae273ad5da382c2031cd8266d2d0c771e4732d677032df6
        • Opcode Fuzzy Hash: b3c11de906062f1a3d35c1d8a6cddde61ad6a28a78d8f692965bff427d6df6d0
        • Instruction Fuzzy Hash: C921FCB05093029EE750AF6AD99931BFFE4AB90364F10892DE4E44B390D779C589CF93
        APIs
        • MultiByteToWideChar.KERNEL32 ref: 64669675
        • al_malloc_with_context.MSIMG32 ref: 646696A5
        • MultiByteToWideChar.KERNEL32 ref: 646696D3
        • al_free_with_context.MSIMG32 ref: 64669703
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ByteCharMultiWide$al_free_with_contextal_malloc_with_context
        • String ID: '$_al_win_utf16
        • API String ID: 2230065822-1927691106
        • Opcode ID: f3f500cdee23bbdd4dc3671e9bb0a85751a9fea9cfc85412768836555e5487bb
        • Instruction ID: 5b8d5217c8cfe5d723d2053fa85676cdbb45549a8f21a71b17677c2d064b7dab
        • Opcode Fuzzy Hash: f3f500cdee23bbdd4dc3671e9bb0a85751a9fea9cfc85412768836555e5487bb
        • Instruction Fuzzy Hash: 7E11FBB05093029EE350AF69D95835BBFE4EF95364F50CA2DE4A48B390D379C449CB93
        APIs
        • al_malloc_with_context.MSIMG32 ref: 645FF662
        • al_set_errno.MSIMG32 ref: 645FF69F
        • al_free_with_context.MSIMG32 ref: 645FF6C7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_contextal_malloc_with_contextal_set_errno
        • String ID: 3$al_fopen_interface$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\file.c
        • API String ID: 2503516971-3238006543
        • Opcode ID: 1fce6c0d248180c7a66a6d3cab482d734c5865eae4adc60869e89cf3c901b7d3
        • Instruction ID: 21105ea8febbd5c311f2c8d09d308a935983e5afa09ed66cc611c95ad1b6ccc5
        • Opcode Fuzzy Hash: 1fce6c0d248180c7a66a6d3cab482d734c5865eae4adc60869e89cf3c901b7d3
        • Instruction Fuzzy Hash: 750125B02083018FE741AF68D58031ABBE1AF99314F11892DE8C88B350DB78C442DF67
        APIs
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\d3d_display_formats.cpp, xrefs: 64660094
        • _al_d3d_destroy_display_format_list, xrefs: 6466008C
        • *, xrefs: 6466009C
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_vector_free_al_vector_refal_free_with_context
        • String ID: *$_al_d3d_destroy_display_format_list$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\d3d_display_formats.cpp
        • API String ID: 3539229777-1920393612
        • Opcode ID: 590aa27b05c21f825d2c900503d4e9a941301901490ad62e2e433d48ab77605c
        • Instruction ID: 24e226471946f42317c5e3279235aa0ce8850e089fa0d5e0bb8d8291ccccc25d
        • Opcode Fuzzy Hash: 590aa27b05c21f825d2c900503d4e9a941301901490ad62e2e433d48ab77605c
        • Instruction Fuzzy Hash: 69F039B0509700AFD701AF658A95A1EFBA4EB27704F80C82CE18997B01D730C885DB87
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: Lookup$ContextErrorSuspended
        • String ID:
        • API String ID: 4013880882-0
        • Opcode ID: 2d6b268f0938de56630d8616861258255a1e4392e239e65767f53198eda85a78
        • Instruction ID: 71c3d020ba6559898c3db4faf597587a68a6a04bc8aa2d275f6e9ea423e2cd71
        • Opcode Fuzzy Hash: 2d6b268f0938de56630d8616861258255a1e4392e239e65767f53198eda85a78
        • Instruction Fuzzy Hash: 67616874608302CFD704DF59C184A5AF7E0BF9A708F158A6EE8989B311E7B5D842CF82
        APIs
        • GetContextSuspended.MSIMG32 ref: 6468D74F
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 6468D78B
        • alSetError.MSIMG32 ref: 6468D7A3
        • LookupUIntMapKey.MSIMG32 ref: 6468D7DA
        • RemoveUIntMapKey.MSIMG32 ref: 6468D8B7
        • alSetError.MSIMG32 ref: 6468D906
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLeaveLookupValue$ContextRemoveSuspended
        • String ID:
        • API String ID: 2096200023-0
        • Opcode ID: 02ab453cb6b64ebe27ce8c92167721aeda32dab85f116078ec291812af26c02b
        • Instruction ID: 6767d16666be790e8322a30fd3c10d23166ff85dc84ae11256297dda809eab1b
        • Opcode Fuzzy Hash: 02ab453cb6b64ebe27ce8c92167721aeda32dab85f116078ec291812af26c02b
        • Instruction Fuzzy Hash: F251E4B46083068FEB00DF29C480A5AB7F5FF99354F15896EE9988B315E731D845CBB2
        APIs
        • al_ref_cstr.MSIMG32 ref: 645CF5FA
        • al_get_current_transform.MSIMG32 ref: 645CF658
        • al_copy_transform.MSIMG32 ref: 645CF66C
        • al_invert_transform.MSIMG32 ref: 645CF674
        • al_transform_coordinates.MSIMG32 ref: 645CF694
        • al_transform_coordinates.MSIMG32 ref: 645CF6D4
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_transform_coordinates$al_copy_transformal_get_current_transformal_invert_transformal_ref_cstr
        • String ID:
        • API String ID: 1862433415-0
        • Opcode ID: 248f4c220bb38c264c4dc5581139c4e44a9ef9628ad8ff5a5a2fcbd3f74a7d78
        • Instruction ID: 407a9ccb338f5d3a1058b622e64e4ed0025f81547c73291126a6d2f5dc57ebbe
        • Opcode Fuzzy Hash: 248f4c220bb38c264c4dc5581139c4e44a9ef9628ad8ff5a5a2fcbd3f74a7d78
        • Instruction Fuzzy Hash: 4041C8B1609380DFD310AF24D48865EFBE0BF89304F018C6EEAC967290D77198A4DB86
        APIs
        • GetContextSuspended.MSIMG32 ref: 646A601F
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646A6066
        • alSetError.MSIMG32 ref: 646A607E
        • alSetError.MSIMG32 ref: 646A6107
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 65270113-0
        • Opcode ID: f122347653aab74a856587db05d926947e9096e9a24eca05b30c8b02fae0b1a8
        • Instruction ID: ed7ba48982240401907fa0b33e326af7067c635332dfc82b73f5d78220ab721b
        • Opcode Fuzzy Hash: f122347653aab74a856587db05d926947e9096e9a24eca05b30c8b02fae0b1a8
        • Instruction Fuzzy Hash: 323103B4608B028FD700DF6DD68465ABBE0EF99744F01582DEAC4C7311E776E8868B96
        APIs
        Strings
        • _dsound_start_voice, xrefs: 645C56E0
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\dsound.cpp, xrefs: 645C56E8
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_create_threadal_start_thread
        • String ID: _dsound_start_voice$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\dsound.cpp
        • API String ID: 2677644387-904969650
        • Opcode ID: 310fc15f9a5a2650b9fb37305613b910a52a856d578b2166a836030399305892
        • Instruction ID: 02526a07ff728320991418ba388ad4deb84cbf11d1b0db02d4f5b93b7f20b0d2
        • Opcode Fuzzy Hash: 310fc15f9a5a2650b9fb37305613b910a52a856d578b2166a836030399305892
        • Instruction Fuzzy Hash: EA4106755183008FDB44EF68D18865ABBF0FF88314F5489ADE9888B35AE779D484DF82
        APIs
        • GetContextSuspended.MSIMG32 ref: 6469D07B
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • ProcessContext.MSIMG32 ref: 6469D120
        • alSetError.MSIMG32 ref: 6469D1AF
        • ProcessContext.MSIMG32 ref: 6469D1BB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Context$EnterLeaveProcessValue$ErrorSuspended
        • String ID:
        • API String ID: 4098443732-3916222277
        • Opcode ID: abe3e383d09cc5924e0bc7fd902ae91db06e212f127b8af80f769097380a6bee
        • Instruction ID: b6673ce304477d424a2a7cad7f1853412226c0b1caa4406c1f6d98493e120c33
        • Opcode Fuzzy Hash: abe3e383d09cc5924e0bc7fd902ae91db06e212f127b8af80f769097380a6bee
        • Instruction Fuzzy Hash: 1731A2766097028FE7019F29C98022EBBF4EF97358F14443DD9A48B350DBB9D886CB52
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ErrorS_set
        • String ID: Out of memory$buffer must fit in 32-bits$irectSoundCapture
        • API String ID: 1705320395-256789618
        • Opcode ID: feb8ae9751845b60e5e53c580cdc39674abdd6f0f11723a0f37744f0b7f5e105
        • Instruction ID: c366ad9aad5208326a7384dff36ad45041c82977370162e229bb6509388d275b
        • Opcode Fuzzy Hash: feb8ae9751845b60e5e53c580cdc39674abdd6f0f11723a0f37744f0b7f5e105
        • Instruction Fuzzy Hash: A94115B06097008FD7209F29D48471ABBF5EF98350F518D2DE48687B50E7B5E888CBA2
        APIs
        • al_malloc_with_context.MSIMG32 ref: 64604661
        • al_malloc_with_context.MSIMG32 ref: 6460469C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context
        • String ID: _al_bfromcstralloc$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c
        • API String ID: 1952898122-3067120074
        • Opcode ID: d522d639e18a3cb2a9340868b64b12ce8b5adf08e844e4c19da6951009e611ac
        • Instruction ID: cffc143020630218978676aa4aee6e6ea57944c2c5c87e5caccb11f86f654876
        • Opcode Fuzzy Hash: d522d639e18a3cb2a9340868b64b12ce8b5adf08e844e4c19da6951009e611ac
        • Instruction Fuzzy Hash: BC31C375B197009BD3589E6D965022E7BD5EBE0B50F16CA7CF98CDB340E6B1C842CB82
        APIs
        • al_malloc_with_context.MSIMG32 ref: 64604531
        • al_malloc_with_context.MSIMG32 ref: 6460455C
        • al_free_with_context.MSIMG32 ref: 64604607
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context$al_free_with_context
        • String ID: _al_bfromcstr$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c
        • API String ID: 1085489009-1792728968
        • Opcode ID: 3b43a1f6d4ac6c4cf9770303adc51d86303df3eaa7ceb963196401992796ae60
        • Instruction ID: e31944e371e84bdfceaa5557782e724ae8d63d503476af568554842e7d1254b0
        • Opcode Fuzzy Hash: 3b43a1f6d4ac6c4cf9770303adc51d86303df3eaa7ceb963196401992796ae60
        • Instruction Fuzzy Hash: C021F871A087055BE35A9F59968062EBBD1EBD0710F16CA3DF5488B340E6F1CC41C7D2
        APIs
        • al_get_new_display_option.MSIMG32 ref: 6466B7E7
          • Part of subcall function 645FB84C: _al_get_new_display_settings.MSIMG32 ref: 645FB853
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_get_new_display_settingsal_get_new_display_option
        • String ID: $"$ALEX$Allegro
        • API String ID: 1153838339-1571640283
        • Opcode ID: 51c772d99913ba27fa29e130b244430e262478b4d8f64a95ba4da03403f9b4bf
        • Instruction ID: 911e063c90327327af9e180a53d4ba0bc99f0aab805b0abbad494ebfeb621113
        • Opcode Fuzzy Hash: 51c772d99913ba27fa29e130b244430e262478b4d8f64a95ba4da03403f9b4bf
        • Instruction Fuzzy Hash: 184171B45083419FD360EF29C54878BBBE4AB88754F108E2DE9D887350D7B99549CF93
        APIs
        Strings
        • al_fopen_slice, xrefs: 64600467
        • E, xrefs: 64600544
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\file_slice.c, xrefs: 6460046F
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_ftellal_malloc_with_context
        • String ID: E$al_fopen_slice$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\file_slice.c
        • API String ID: 1735643697-551937708
        • Opcode ID: 55fc3383ebd7e48b39954726490a0838b29dc54702dd8b47b0c27431b50c8de8
        • Instruction ID: ea68ab9af56913872d5ac05113bdae6103b9f25cbe78b9705687dcff6502ddc9
        • Opcode Fuzzy Hash: 55fc3383ebd7e48b39954726490a0838b29dc54702dd8b47b0c27431b50c8de8
        • Instruction Fuzzy Hash: AF212BB0108701DBE7059F26D78421FBBE0EF96B58F00882DE9888B342D776D946DF56
        APIs
        • al_free_with_context.MSIMG32 ref: 6460A6B9
        Strings
        • _al_list_destroy, xrefs: 6460A69E
        • list_destroy_item, xrefs: 6460A67A
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c, xrefs: 6460A682, 6460A6A6
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context
        • String ID: _al_list_destroy$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c$list_destroy_item
        • API String ID: 3891110267-271976259
        • Opcode ID: 897d0c079ac501582bc442a37a97a957a24027ec61a6aa6d2b918eb36b6bdd99
        • Instruction ID: f07e5302cca8606b0e5601e928654b6009301e898b55f51977a67fe0cfb0ae74
        • Opcode Fuzzy Hash: 897d0c079ac501582bc442a37a97a957a24027ec61a6aa6d2b918eb36b6bdd99
        • Instruction Fuzzy Hash: 3C21F4B4719B008FD728DF19C680A26BBF1EFA4B50B15CA5DD8A98B305D730E841CB91
        APIs
        • al_realloc_with_context.MSIMG32 ref: 6460B15B
        • al_malloc_with_context.MSIMG32 ref: 6460B18D
        Strings
        • _al_vector_alloc_back, xrefs: 6460B170
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\vector.c, xrefs: 6460B13C, 6460B178
        • _al_vector_alloc_mid, xrefs: 6460B134
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_contextal_realloc_with_context
        • String ID: _al_vector_alloc_back$_al_vector_alloc_mid$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\vector.c
        • API String ID: 4147073182-356497922
        • Opcode ID: ebc9d49817974f9e4c9f7164b7f9daed55b44dae252eca22386e43f3d0acffb3
        • Instruction ID: ac52a98304ce2298337bc43a9e86de2002d66f506b1cee62121457a1e6b43780
        • Opcode Fuzzy Hash: ebc9d49817974f9e4c9f7164b7f9daed55b44dae252eca22386e43f3d0acffb3
        • Instruction Fuzzy Hash: 7821C3B1A08201CFDB08CF29DAC1A16BBE5FF95B50B18D999D8488F35AD734D841CF96
        APIs
        • al_calloc_with_context.MSIMG32 ref: 645C1660
        • al_free_with_context.MSIMG32 ref: 645C16F5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_calloc_with_contextal_free_with_context
        • String ID: `$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\flac.c$flac_open
        • API String ID: 973425427-426841044
        • Opcode ID: 40df35ef6592c260781039ac677211449201703d14853ffeeb2f57e28940635f
        • Instruction ID: ba26c47c379fb7d2d5ba9719a4f983f2f37f34eee6505b5edadeadaf03ef7f17
        • Opcode Fuzzy Hash: 40df35ef6592c260781039ac677211449201703d14853ffeeb2f57e28940635f
        • Instruction Fuzzy Hash: E131C4B450A3A48BDB02AF61D6A934E7FE0FB56B80F00891CE8989B704C334C484DF87
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_add_exit_func_al_stricmp_al_vector_ref
        • String ID: .$acodec_shutdown
        • API String ID: 4245070873-720399051
        • Opcode ID: 6fa2c650e2d6998e3d61c4856f703c9ca02deeeccd721bef5472e1b023b433c1
        • Instruction ID: b2b6dd1ddb57554d7466888fd0ff9111f307fe49de98efea83614bf586885594
        • Opcode Fuzzy Hash: 6fa2c650e2d6998e3d61c4856f703c9ca02deeeccd721bef5472e1b023b433c1
        • Instruction Fuzzy Hash: 2A1164706087548BD700EFAAD58865BBBE0EBC6658F01892EE5C887300E731D885EB83
        APIs
        • __PHYSFS_platformGrabMutex.MSIMG32 ref: 64682086
          • Part of subcall function 64688614: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,646809A2), ref: 64688626
        • __PHYSFS_platformReleaseMutex.MSIMG32 ref: 646820C0
        • __PHYSFS_setError.MSIMG32 ref: 64682100
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: MutexS_platform$ErrorGrabObjectReleaseS_setSingleWait
        • String ID: Out of memory
        • API String ID: 4004297999-696950042
        • Opcode ID: 395208507816f49d549842d9df3f1f3f0a9ac621409b507020f32f6332c44b36
        • Instruction ID: bed0d783951b6779f89bd8df5287af8a6f12418c27e5bdedafc5faf84f225c08
        • Opcode Fuzzy Hash: 395208507816f49d549842d9df3f1f3f0a9ac621409b507020f32f6332c44b36
        • Instruction Fuzzy Hash: 9F1104B03083018FEB40DF69E484A5EB7E1AF95714F41482CE9809B385DB35D889CBB6
        APIs
        • __PHYSFS_initSmallAlloc.MSIMG32 ref: 646870D2
        • PHYSFS_utf8ToUcs2.MSIMG32 ref: 646870F0
        • __PHYSFS_smallFree.MSIMG32(?), ref: 6468710B
        • __PHYSFS_setError.MSIMG32 ref: 6468713B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: AllocErrorFreeS_initS_setS_smallS_utf8SmallUcs2
        • String ID: Out of memory
        • API String ID: 2087461672-696950042
        • Opcode ID: 0dbbefa2757a1c44c7c5f82434e398cddd55d5321d966a52e417237dd9133ca1
        • Instruction ID: 4a26cd994aba04fe432e01acc8946878451e15378281964ddcfb3aaed6657a42
        • Opcode Fuzzy Hash: 0dbbefa2757a1c44c7c5f82434e398cddd55d5321d966a52e417237dd9133ca1
        • Instruction Fuzzy Hash: E9119472A047049EDB00AF79DC8559EBBE8EF81365F014A2EE5A4C7290D774D445CBA2
        APIs
        • al_malloc_with_context.MSIMG32 ref: 64624613
        • _al_event_source_init.MSIMG32 ref: 64624621
          • Part of subcall function 645FEFE0: _al_mutex_init.MSIMG32 ref: 645FEFF7
          • Part of subcall function 645FEFE0: _al_vector_init.MSIMG32 ref: 645FF00A
        • _al_register_destructor.MSIMG32 ref: 64624673
          • Part of subcall function 645FE3A4: _al_tls_get_dtor_owner_count.MSIMG32(?,?,?,?,?,645C5E8C), ref: 645FE3AC
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\timernu.c, xrefs: 646245FC
        • al_create_timer, xrefs: 646245F4
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_event_source_init_al_mutex_init_al_register_destructor_al_tls_get_dtor_owner_count_al_vector_inital_malloc_with_context
        • String ID: al_create_timer$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\timernu.c
        • API String ID: 2371000205-3630854620
        • Opcode ID: d32324399cd6067c781734d9cffe170a7c6591e961e1b4ec7d0ae3061f50e873
        • Instruction ID: 12e71efe603e4ba1e867d6355af1c0b7c8c7c6d36667abccbad3f20c575cbc85
        • Opcode Fuzzy Hash: d32324399cd6067c781734d9cffe170a7c6591e961e1b4ec7d0ae3061f50e873
        • Instruction Fuzzy Hash: 9501FBB0108701DAEB409F20C5C970A7EE0FB94348F4488ACE8C84F346CB758499DF53
        APIs
        • al_ustr_size.MSIMG32 ref: 646230D7
        • al_ustr_rfind_chr.MSIMG32 ref: 646230EE
          • Part of subcall function 646594F4: _al_binstrr.MSIMG32(?,?,?,?,?,?,?,?,?,?,?,?,?,646230F3), ref: 64659553
        • al_cstr.MSIMG32 ref: 64623100
        • al_ustr_size.MSIMG32 ref: 64623116
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_ustr_size$_al_binstrral_cstral_ustr_rfind_chr
        • String ID: .
        • API String ID: 4211488118-248832578
        • Opcode ID: 2ee6556b46f8a9c5dd249f93e2503360b82d93a9dee90bc3885ed7e984111f22
        • Instruction ID: 3c98133e1c1605b12bcb46be8c03744fe8768e4bcef272e0500fa98abac29a1c
        • Opcode Fuzzy Hash: 2ee6556b46f8a9c5dd249f93e2503360b82d93a9dee90bc3885ed7e984111f22
        • Instruction Fuzzy Hash: 81F012B5914310DFDB00EF39D5C844ABFE0AF04258F058958D8889B765E734DC90CF65
        APIs
        • InitializeCriticalSection.KERNEL32(?,?,?,?,?,645FF18C), ref: 6466C475
        • al_malloc_with_context.MSIMG32 ref: 6466C49F
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\wxthread.c, xrefs: 6466C488
        • _al_mutex_init, xrefs: 6466C480
        • f, xrefs: 6466C490
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalInitializeSectional_malloc_with_context
        • String ID: _al_mutex_init$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\wxthread.c$f
        • API String ID: 4127386434-2618818230
        • Opcode ID: 53e9c64cc499b68ac0a3a5eea8c82b4d8f75ed19ef0ed175feeaa13124f607a4
        • Instruction ID: 0ee3e290270acd2f148187933e311fa4f290726cf12b5d3d9c8f9545d3bd089a
        • Opcode Fuzzy Hash: 53e9c64cc499b68ac0a3a5eea8c82b4d8f75ed19ef0ed175feeaa13124f607a4
        • Instruction Fuzzy Hash: 79E01AB00193059BEB41AFB8CA8461A7BE8AF61208F40895CD8C59B305E739C1449BA3
        APIs
        • InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,645FF18C), ref: 6466C4C1
        • al_malloc_with_context.MSIMG32 ref: 6466C4EB
        Strings
        • f, xrefs: 6466C4DC
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\wxthread.c, xrefs: 6466C4D4
        • _al_mutex_init, xrefs: 6466C4CC
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalInitializeSectional_malloc_with_context
        • String ID: _al_mutex_init$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\wxthread.c$f
        • API String ID: 4127386434-2618818230
        • Opcode ID: 53e9c64cc499b68ac0a3a5eea8c82b4d8f75ed19ef0ed175feeaa13124f607a4
        • Instruction ID: 1a2c0d5c1378ef3dd9c14e06c50fc6e1a6c378bea06fdec159e96c854a2fcb73
        • Opcode Fuzzy Hash: 53e9c64cc499b68ac0a3a5eea8c82b4d8f75ed19ef0ed175feeaa13124f607a4
        • Instruction Fuzzy Hash: 66E04FF00083069BFB41AFB8CA8471E7BE4AFA1308F40895CD8C59B305E739C1449B53
        APIs
        Strings
        • al_create_file_handle, xrefs: 645FF6D3
        • F, xrefs: 645FF6E3
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\file.c, xrefs: 645FF6DB
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_contextal_set_errno
        • String ID: F$al_create_file_handle$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\file.c
        • API String ID: 560788752-3692454634
        • Opcode ID: a1a82cb90c3dcea3fec6556b1654aa62103f2d56094898dc44ca1cdd02a29d5a
        • Instruction ID: afc02bf3cb9c212be2abc832d78c587167c053ffade1c413d436581b4f182bcc
        • Opcode Fuzzy Hash: a1a82cb90c3dcea3fec6556b1654aa62103f2d56094898dc44ca1cdd02a29d5a
        • Instruction Fuzzy Hash: C6F09BB450A7019FE704DF26D280B1ABBE1AF85304F41C95DE8984B351E379C946DF97
        APIs
        • DeleteCriticalSection.KERNEL32 ref: 6466C50D
        • al_free_with_context.MSIMG32 ref: 6466C530
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\wxthread.c, xrefs: 6466C51B
        • |, xrefs: 6466C523
        • _al_mutex_destroy, xrefs: 6466C513
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalDeleteSectional_free_with_context
        • String ID: _al_mutex_destroy$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\win\wxthread.c$|
        • API String ID: 2052458369-1944867315
        • Opcode ID: ea80ab4f821c9d1023ac4385b507300ffeaf75c3bb584d914e5295b34b7b1c64
        • Instruction ID: 6063474122988094ebbcfc51a350cd95a43ffb94eebd33cd828d77762a28d7a5
        • Opcode Fuzzy Hash: ea80ab4f821c9d1023ac4385b507300ffeaf75c3bb584d914e5295b34b7b1c64
        • Instruction Fuzzy Hash: 85E04FF4408700CFEB41AF68CAC470A7BE4AF65304F40884CE4889B301D338D4418F43
        APIs
        • GetContextSuspended.MSIMG32 ref: 6468F5C3
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 6468F5EC
        • alSetError.MSIMG32 ref: 6468F62A
        • alSetError.MSIMG32 ref: 6468F64B
        • alSetError.MSIMG32 ref: 6468F74B
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 1516355843-0
        • Opcode ID: 19c8a128bfa9176c9e106066565036aac622642101812f0c772f1c581bc9613d
        • Instruction ID: 5a6585a5051ffc830e82982d7063a9282958e17fd6404a0e380eafcdad9ccc20
        • Opcode Fuzzy Hash: 19c8a128bfa9176c9e106066565036aac622642101812f0c772f1c581bc9613d
        • Instruction Fuzzy Hash: A441037120D302CFD7409F16D1441ABBBF0FF89711F91492EE9E48A654E37688A8CBA6
        APIs
        • GetContextSuspended.MSIMG32 ref: 646976BB
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646976E2
        • alSetError.MSIMG32 ref: 64697718
        • alSetError.MSIMG32 ref: 646977AF
        • alSetError.MSIMG32 ref: 646977D7
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 1516355843-0
        • Opcode ID: 0a4d086c3b7cc4a537b2038b92d6001679619ba62a591179617dfa1d1d013bcf
        • Instruction ID: 3e48dea3bef13eede47c3b5a12e214c6cddc00889fa61956fa3f53d2fa598e23
        • Opcode Fuzzy Hash: 0a4d086c3b7cc4a537b2038b92d6001679619ba62a591179617dfa1d1d013bcf
        • Instruction Fuzzy Hash: 5B31BC76708302CBE740AF2CE4C459EBBE0EB82766F48086EE8858F311D3B5D445CB92
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e06e290566814414e9994de84d5af9e817499cfa26b6aca0bfe62dd2ee828f65
        • Instruction ID: 2fb9fc55804237e5229d44d46818fda6d38166c2dcf66ddc043640b3b6f26e45
        • Opcode Fuzzy Hash: e06e290566814414e9994de84d5af9e817499cfa26b6aca0bfe62dd2ee828f65
        • Instruction Fuzzy Hash: 0A31C2717082058FD704DF29D48065AB7E2EFD8324F15892ED8AD8B350D731D894CB72
        APIs
        • GetContextSuspended.MSIMG32 ref: 646A710A
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646A7125
        • alSetError.MSIMG32 ref: 646A7144
        • alSetError.MSIMG32 ref: 646A71E3
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 65270113-0
        • Opcode ID: 4afd77ac52fba55cb0c3f6fb56a3fc6adc2014bad698ae2ade18b67e0dfb7700
        • Instruction ID: 7bb0294c5058421756add6d8866ad2fedc3ab823406dbad6524a64b03156abb8
        • Opcode Fuzzy Hash: 4afd77ac52fba55cb0c3f6fb56a3fc6adc2014bad698ae2ade18b67e0dfb7700
        • Instruction Fuzzy Hash: C421D371B08703DAD7013F18DD8868ABBE0FB82396F195999D89127395E331CCD58BDA
        APIs
        • al_get_current_transform.MSIMG32 ref: 645CF496
          • Part of subcall function 64626940: al_get_target_bitmap.MSIMG32(?,?,645CF49B), ref: 64626943
        • al_copy_transform.MSIMG32 ref: 645CF4AA
        • al_invert_transform.MSIMG32 ref: 645CF4B2
        • al_transform_coordinates.MSIMG32 ref: 645CF4D4
        • al_transform_coordinates.MSIMG32 ref: 645CF51C
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_transform_coordinates$al_copy_transformal_get_current_transformal_get_target_bitmapal_invert_transform
        • String ID:
        • API String ID: 3087772260-0
        • Opcode ID: a8c18f36245a4239c6b98c99f791a6dc67deed6fe3a7777e7c31b01b148fc1f8
        • Instruction ID: 77c9e8e45bdb2f6c9e0211a8363fc332e70c0f8fa4b5aa34e33f26388d5c6d07
        • Opcode Fuzzy Hash: a8c18f36245a4239c6b98c99f791a6dc67deed6fe3a7777e7c31b01b148fc1f8
        • Instruction Fuzzy Hash: 7D31DBB5A09380DFC3209F24D58469ABBE1FFCA304F028C5CE9C86B250C7309965DB9B
        APIs
        • _al_event_source_needs_to_generate_event.MSIMG32 ref: 64668696
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_event_source_needs_to_generate_event
        • String ID:
        • API String ID: 2335762959-0
        • Opcode ID: a6cc658ecc96b138cf8a2d6b9dbedfb077d4eabe46e5bd262b747a8f3b6bf554
        • Instruction ID: f632b2a0d392b02205ed2ec0556de24fcaaae8a4ef214692fc528b1296874514
        • Opcode Fuzzy Hash: a6cc658ecc96b138cf8a2d6b9dbedfb077d4eabe46e5bd262b747a8f3b6bf554
        • Instruction Fuzzy Hash: 293136B59193508FDB90DF29C45424EBBE4FB8A368F505A1EEAA893360C3719409CF97
        APIs
        • GetContextSuspended.MSIMG32 ref: 646A671A
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646A6733
        • alSetError.MSIMG32 ref: 646A6752
        • alSetError.MSIMG32 ref: 646A6797
        • alSetError.MSIMG32 ref: 646A67D7
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 1516355843-0
        • Opcode ID: 9ee60b5097aa22b4cd2e0b937702028f932a5fd10edb6e1e7956258ab4ace7dd
        • Instruction ID: 7f0c75f259fd525a4e567f46544b018a47fe693f6c38e24d052012bb15ce8345
        • Opcode Fuzzy Hash: 9ee60b5097aa22b4cd2e0b937702028f932a5fd10edb6e1e7956258ab4ace7dd
        • Instruction Fuzzy Hash: 9611B471A18702DAE7015F18D9C069EBBE0FFC23A4F10692EE8C117381D375C895CB86
        APIs
        • _al_event_source_needs_to_generate_event.MSIMG32 ref: 64668471
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_event_source_needs_to_generate_event
        • String ID:
        • API String ID: 2335762959-0
        • Opcode ID: 78764b4065b3845d468bb556c1aed12b8ffabeb41969f1a18ec50c377717fced
        • Instruction ID: f0970e8fc7bbadb9f848b21eacf45ae967e4918d1a0247aea0ca8e4919de22a2
        • Opcode Fuzzy Hash: 78764b4065b3845d468bb556c1aed12b8ffabeb41969f1a18ec50c377717fced
        • Instruction Fuzzy Hash: CC21F2B54183408FDB90DF15D49434EBBE8FB86368F40592EEA8897220C7759449DF93
        APIs
        • _al_event_source_needs_to_generate_event.MSIMG32 ref: 6466856D
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_event_source_needs_to_generate_event
        • String ID:
        • API String ID: 2335762959-0
        • Opcode ID: a5a7c3cd4bc33a189cc3ae86af24d858a2ac790895f873f3fc8a36f33f39a28c
        • Instruction ID: 90113ee67edd42e52f47528f9a1c6838a4e83e95cdb2885cd074e3b7c435af90
        • Opcode Fuzzy Hash: a5a7c3cd4bc33a189cc3ae86af24d858a2ac790895f873f3fc8a36f33f39a28c
        • Instruction Fuzzy Hash: 9E2114B59193408FDB90DF15D49474EBBE4FB86368F40992EEA8893320C3729809DF93
        APIs
        • GetContextSuspended.MSIMG32 ref: 64697577
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646975A2
        • alSetError.MSIMG32 ref: 646975B6
        • alSetError.MSIMG32 ref: 646975D7
        • alSetError.MSIMG32 ref: 646975FF
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 1516355843-0
        • Opcode ID: 70029fe7c92b590330737125c102664b2a05c8d32466926101b61a7edb50f6d8
        • Instruction ID: 4c29e95dba83bbae5d074fd2d3212f86c40cea1d94f8d52252531153a231fc31
        • Opcode Fuzzy Hash: 70029fe7c92b590330737125c102664b2a05c8d32466926101b61a7edb50f6d8
        • Instruction Fuzzy Hash: 82117072608746CBD680AF25D88466FBBF0EFC1725F04492ED9844B301D7B6D845CB96
        APIs
        • GetContextSuspended.MSIMG32 ref: 646977FF
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 6469782A
        • alSetError.MSIMG32 ref: 6469783E
        • alSetError.MSIMG32 ref: 6469785F
        • alSetError.MSIMG32 ref: 64697887
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 1516355843-0
        • Opcode ID: 70029fe7c92b590330737125c102664b2a05c8d32466926101b61a7edb50f6d8
        • Instruction ID: 6eb5db7ca5d9d10838b89ad6202c61062cf6c495079f704de60c6d76c837b79e
        • Opcode Fuzzy Hash: 70029fe7c92b590330737125c102664b2a05c8d32466926101b61a7edb50f6d8
        • Instruction Fuzzy Hash: 13119A726083068FE300AF19D58465EBBE0EFC2354F00496ED9898B301D3B2D849CB82
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6466C628
        • LeaveCriticalSection.KERNEL32(00000000,00000000), ref: 6466C649
        • ReleaseSemaphore.KERNEL32(?), ref: 6466C661
        • EnterCriticalSection.KERNEL32(00000000), ref: 6466C67D
        • LeaveCriticalSection.KERNEL32(00000000), ref: 6466C6A3
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave$ReleaseSemaphore
        • String ID:
        • API String ID: 1930678883-0
        • Opcode ID: de3bbfdc7d5ced9ed7315ffa156e9c2b9310bacbb8962f843a745b77f6457249
        • Instruction ID: 8eef87a8b8c840b046c06ec023403dd9d7cae7a6bd74305a1187ea938b47c524
        • Opcode Fuzzy Hash: de3bbfdc7d5ced9ed7315ffa156e9c2b9310bacbb8962f843a745b77f6457249
        • Instruction Fuzzy Hash: 78113CB16046209BEF40AF28D9C872ABBE8FF44714F458599E889DF309D334D844CBA3
        APIs
        • GetContextSuspended.MSIMG32 ref: 646A667B
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646A6690
        • alSetError.MSIMG32 ref: 646A66AE
        • alAuxiliaryEffectSloti.MSIMG32 ref: 646A66D2
        • alSetError.MSIMG32 ref: 646A66FB
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLeaveValue$AuxiliaryContextEffectLookupSlotiSuspended
        • String ID:
        • API String ID: 1044099641-0
        • Opcode ID: 24656d8d30873f7e769e9205cc9366330c41e9af7f7374bbe6357332235344cb
        • Instruction ID: 4f342753ea5a960fd19e4244934ab869adba47fb2da32dd26d6340f07e6b68c1
        • Opcode Fuzzy Hash: 24656d8d30873f7e769e9205cc9366330c41e9af7f7374bbe6357332235344cb
        • Instruction Fuzzy Hash: 190184726097419BD700AF1CD98049EBBE4EEC1354F48682EE9C487311D375D885DB93
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6466C6BF
        • LeaveCriticalSection.KERNEL32(00000000), ref: 6466C6DC
        • ReleaseSemaphore.KERNEL32(00000000), ref: 6466C6F8
        • EnterCriticalSection.KERNEL32 ref: 6466C715
        • LeaveCriticalSection.KERNEL32 ref: 6466C73B
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave$ReleaseSemaphore
        • String ID:
        • API String ID: 1930678883-0
        • Opcode ID: 06d423469d71e9f9510d47be472ae358e389256df6cc8bc6cc94237068db6a07
        • Instruction ID: 7520fce4c299e10973f8fd2362adbaab20ebfdd3ac8060a444a3bf80e9e066be
        • Opcode Fuzzy Hash: 06d423469d71e9f9510d47be472ae358e389256df6cc8bc6cc94237068db6a07
        • Instruction Fuzzy Hash: 0811FAB05046109BEF40EF28D5C875ABBE4FF55308F558499E8898F309D735D985CBA3
        APIs
        • GetContextSuspended.MSIMG32 ref: 646974CA
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646974E9
        • alSetError.MSIMG32 ref: 646974FD
        • alSetError.MSIMG32 ref: 6469751F
        • alSetError.MSIMG32 ref: 6469753F
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 1516355843-0
        • Opcode ID: f649f4490f7878ac4973a38af9d16156600eba018c8dab068eeae2c25ff35dd3
        • Instruction ID: 9dfcb17e3381fe23e40cf3db89b7750f79980d909f53582991fcc128bda6ae19
        • Opcode Fuzzy Hash: f649f4490f7878ac4973a38af9d16156600eba018c8dab068eeae2c25ff35dd3
        • Instruction Fuzzy Hash: 3B0180726093418BE700AF18E88019EBBE0FF81768F540A6ED8844B202D7B9D845DB86
        APIs
        • GetContextSuspended.MSIMG32 ref: 64697616
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 64697635
        • alSetError.MSIMG32 ref: 64697649
        • alSetError.MSIMG32 ref: 6469766B
        • alSetError.MSIMG32 ref: 6469768B
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Error$EnterLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 1516355843-0
        • Opcode ID: f649f4490f7878ac4973a38af9d16156600eba018c8dab068eeae2c25ff35dd3
        • Instruction ID: b002ce0ece7808a7733a82be363d062ce0fd600ba934baac2b76bf597f4ca960
        • Opcode Fuzzy Hash: f649f4490f7878ac4973a38af9d16156600eba018c8dab068eeae2c25ff35dd3
        • Instruction Fuzzy Hash: FC0169726093428BE7006F1CD88059EBBE0FF81768F540A2ED8884B202D3B9D4459BC6
        APIs
        • _al_event_source_needs_to_generate_event.MSIMG32 ref: 6466818B
        • _al_event_source_lock.MSIMG32 ref: 6466819B
        • al_get_time.MSIMG32 ref: 646681A8
        • _al_event_source_emit_event.MSIMG32 ref: 64668208
        • _al_event_source_unlock.MSIMG32 ref: 64668214
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_event_source_emit_event_al_event_source_lock_al_event_source_needs_to_generate_event_al_event_source_unlockal_get_time
        • String ID:
        • API String ID: 3964795395-0
        • Opcode ID: 8e04ef3764d65e90e2796b8b4e0d02adeac48fc56ab1b2a9b85284d3ee69cdf4
        • Instruction ID: 4e49e2cfc0ef89bacfb47d23bdd638dcac7e909f9e932997a9570f093d610759
        • Opcode Fuzzy Hash: 8e04ef3764d65e90e2796b8b4e0d02adeac48fc56ab1b2a9b85284d3ee69cdf4
        • Instruction Fuzzy Hash: C811D6B08193408FDB90DF25C46870EBBE4FB86768F40691EEA9856360C7759449CF97
        APIs
        • EnterCriticalSection.KERNEL32 ref: 6469A698
        • LeaveCriticalSection.KERNEL32 ref: 6469A6DF
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID: :-$ALC_INVALID
        • API String ID: 3168844106-773629073
        • Opcode ID: 518bd2bea2430fefef528496fadf8275fd0a8fb3b24bc88037d85f9996abc20a
        • Instruction ID: 40b42a064ceb81dc64e152ae2273a96916976424afabfad1978b171943b41cf2
        • Opcode Fuzzy Hash: 518bd2bea2430fefef528496fadf8275fd0a8fb3b24bc88037d85f9996abc20a
        • Instruction Fuzzy Hash: E20156B0B192479FD750AF2D898891A77E4BF66758F820A6DE484D7300E774D444CB53
        APIs
        • InterlockedExchange.KERNEL32 ref: 647D2630
        • InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,?,647D27C9), ref: 647D2643
        • InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,647D27C9), ref: 647D2650
        • EnterCriticalSection.KERNEL32(?,?,?,?,?,647D27C9), ref: 647D2679
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$Initialize$EnterExchangeInterlocked
        • String ID:
        • API String ID: 33273390-0
        • Opcode ID: ed05b28e7f7e6a5b06719bf020d927c88a5a2381bb755a831bda42fa2a49f1ac
        • Instruction ID: 6816b1c9386aa1c033d707e979f003d3a8d77d01169ef34e021b2041fe6e086a
        • Opcode Fuzzy Hash: ed05b28e7f7e6a5b06719bf020d927c88a5a2381bb755a831bda42fa2a49f1ac
        • Instruction Fuzzy Hash: C901A2F05187048ADB10BF68CF9E69D36F8DB43308F8109A8D484C7712E335A199CBA3
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: InfoPackRead
        • String ID:
        • API String ID: 2329571848-3916222277
        • Opcode ID: 4c26cff3042437837f2ea14a2b70cefb7eb7a90b3fa293b1cc2b66068202ee88
        • Instruction ID: fee1cbb9bf87763e28c14b759cacbe17779a173fb97effe531bbe0c499810ac2
        • Opcode Fuzzy Hash: 4c26cff3042437837f2ea14a2b70cefb7eb7a90b3fa293b1cc2b66068202ee88
        • Instruction Fuzzy Hash: 92D1E0B46087818FE360CF19C08065AFBE1BFCA348F14992DE9E98B215E776D545CB92
        APIs
        • al_malloc_with_context.MSIMG32 ref: 646217F3
        Strings
        • _al_ogl_persist_fbo, xrefs: 646217D4
        • z, xrefs: 646217E4
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\opengl\ogl_display.c, xrefs: 646217DC
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context
        • String ID: _al_ogl_persist_fbo$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\opengl\ogl_display.c$z
        • API String ID: 1952898122-3537748329
        • Opcode ID: d27d03f2364d636bd05497285b407ab2c2b83af366b14ac7f37a5c1f5579d9cb
        • Instruction ID: b3b084c18573229d71cb58ab6dee43137b3d8bb181311c4792d30034ea5c5fe3
        • Opcode Fuzzy Hash: d27d03f2364d636bd05497285b407ab2c2b83af366b14ac7f37a5c1f5579d9cb
        • Instruction Fuzzy Hash: 9D112E701043059FE708CF49D4C4BDA7BA2BBE0714FA9C5B4D4590FA56E3B799988F81
        APIs
        • al_malloc_with_context.MSIMG32 ref: 6460A57F
        Strings
        • list_do_create, xrefs: 6460A559
        • n, xrefs: 6460A569
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c, xrefs: 6460A561
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c$list_do_create$n
        • API String ID: 1952898122-3791741500
        • Opcode ID: b77d6d8cf33febdfc0b983e3ac3765af55de53107f6867ce279f15efac67cb42
        • Instruction ID: caf6ac53243247c9c95184a2ac91fa3e1b9c1e0bd1c221c1f0f7f5e92492ec82
        • Opcode Fuzzy Hash: b77d6d8cf33febdfc0b983e3ac3765af55de53107f6867ce279f15efac67cb42
        • Instruction Fuzzy Hash: E511F0B09053018FD709CF18E288B56BBE0BB54714F06C6AEC4494F262E379C985CBA2
        APIs
        • _al_add_exit_func.MSIMG32 ref: 645C305A
          • Part of subcall function 645FF32C: al_malloc_with_context.MSIMG32(?,?,?,?,?,?,?,645C49EF,?,?,?,?,?,?,645C1275), ref: 645FF36F
        • register_dumbfile_system.MSIMG32 ref: 645C311B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_add_exit_funcal_malloc_with_contextregister_dumbfile_system
        • String ID: Xl$shutdown_libdumb
        • API String ID: 1547552505-4230594647
        • Opcode ID: c814d9a5d352a530c2c6051a3e69ff669a1a87b704753781f2802cc242212b19
        • Instruction ID: 406b8f49e590636e0e7ef2f79ade6d978c1ec3f52cc4d38e581803231dea327b
        • Opcode Fuzzy Hash: c814d9a5d352a530c2c6051a3e69ff669a1a87b704753781f2802cc242212b19
        • Instruction Fuzzy Hash: AF21BBB491D3B08ADB12EF54A6BA79E7FA1E7A2354F50290DE5444BB01C3318444EF93
        APIs
        • al_realloc_with_context.MSIMG32(?,?,?,?,?,?,?,?,?,00000000,?,645C4998), ref: 6460B08B
        • al_malloc_with_context.MSIMG32(?,?,?,?,?,?,?,?,00000000,?,645C4998), ref: 6460B0BD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_contextal_realloc_with_context
        • String ID: _al_vector_alloc_back$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\vector.c
        • API String ID: 4147073182-1904331329
        • Opcode ID: 9bb11b0155e851343474237aaeaf45c598d58df8045a08a546a837729836b08e
        • Instruction ID: 2b6346b1aabc8bb4ed0993bf196785f72872739013765aaeb75e764284504407
        • Opcode Fuzzy Hash: 9bb11b0155e851343474237aaeaf45c598d58df8045a08a546a837729836b08e
        • Instruction Fuzzy Hash: 431116B0609201CFDB08CF15C6C1A1ABBA0AFA4B00B04C65DD8598F349D735D880CFA2
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_add_exit_func
        • String ID: acodec_shutdown
        • API String ID: 3389651410-2554684679
        • Opcode ID: 4e0b76da569842078f21319d1c85612e9ff12bdd4c7b3c105ae29db3461fa3a0
        • Instruction ID: 39bd6b171352cc8bbc542c7a825a971ae9cc98d132b72aaff57e7370605d01ef
        • Opcode Fuzzy Hash: 4e0b76da569842078f21319d1c85612e9ff12bdd4c7b3c105ae29db3461fa3a0
        • Instruction Fuzzy Hash: FB01B53160E3648BD740AFE9958469ABBE0FF82714F80493EE988E7300D3319448E7D3
        APIs
        • al_lock_mutex.MSIMG32 ref: 645CB61A
          • Part of subcall function 646241FC: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,645C6454), ref: 6462420C
        • _al_set_error.MSIMG32 ref: 645CB65B
        • al_unlock_mutex.MSIMG32 ref: 645CB679
        Strings
        • Attempted to set a stream buffer with a full pending list, xrefs: 645CB64C
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalEnterSection_al_set_erroral_lock_mutexal_unlock_mutex
        • String ID: Attempted to set a stream buffer with a full pending list
        • API String ID: 2140769180-402962720
        • Opcode ID: b105e0565aefb36017b25aa0cdd18da2b1af02e199da800a180d122896bcedd8
        • Instruction ID: 1d1100d8217d64c39a43cc9a99ebf603faea071ac93e69c85bb034b43653927e
        • Opcode Fuzzy Hash: b105e0565aefb36017b25aa0cdd18da2b1af02e199da800a180d122896bcedd8
        • Instruction Fuzzy Hash: D0018F70B057018FEB00EFE5E480B6AB7E4BFA1308F15882CD49A5B310D731E881EB12
        APIs
        • al_get_system_driver.MSIMG32 ref: 6460B620
        • al_get_system_driver.MSIMG32 ref: 6460B62E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_get_system_driver
        • String ID: al_uninstall_mouse
        • API String ID: 1341023863-2041781395
        • Opcode ID: 2c347ee49c03d4323db83c17969c5c257fff7dc945b0d626a46b8781e1e8bd6d
        • Instruction ID: e0cbc91c8f361ba97807215817e83507823105a8313af5a58d9a211110667962
        • Opcode Fuzzy Hash: 2c347ee49c03d4323db83c17969c5c257fff7dc945b0d626a46b8781e1e8bd6d
        • Instruction Fuzzy Hash: A4F058B4B653028FEB08AFB482A861A3BA0FB62F05F45D89CC8504B725CB30D405DF96
        APIs
        • al_get_system_driver.MSIMG32 ref: 64602060
        • al_get_system_driver.MSIMG32 ref: 6460206E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_get_system_driver
        • String ID: al_uninstall_keyboard
        • API String ID: 1341023863-2368255855
        • Opcode ID: abc0cd504c3122a6d90dd2dcffdee012a97f0b53d1b8e6d111cbda16e01e0cfa
        • Instruction ID: 5b3cc521f56de48836ca14c332f0dd1e26ff914de32c69c7dddb880c4a69535c
        • Opcode Fuzzy Hash: abc0cd504c3122a6d90dd2dcffdee012a97f0b53d1b8e6d111cbda16e01e0cfa
        • Instruction Fuzzy Hash: 35F08234244311CFEB489F74C2A869A37A4FF62B46B41C45DC8424B711CB31D845DB96
        APIs
        • _al_ogl_reset_fbo_info.MSIMG32 ref: 646214A0
        • al_free_with_context.MSIMG32 ref: 646214CF
        Strings
        • al_remove_opengl_fbo, xrefs: 646214B4
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\opengl\ogl_bitmap.c, xrefs: 646214BC
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_ogl_reset_fbo_infoal_free_with_context
        • String ID: al_remove_opengl_fbo$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\opengl\ogl_bitmap.c
        • API String ID: 4148522327-144059565
        • Opcode ID: f6eca4f28b05606c42f65e8f5505631cc118fdec73fd541851d46ea8ce50a99b
        • Instruction ID: e867aea86596b187fcb39a324631e2a1fb18aa6891dbc98e297c8d171829be93
        • Opcode Fuzzy Hash: f6eca4f28b05606c42f65e8f5505631cc118fdec73fd541851d46ea8ce50a99b
        • Instruction Fuzzy Hash: 6FF032B19097009BEB80AF24C68978ABFE5AF51314F49C8ACD88C4F352D7398084CF63
        APIs
        • al_malloc_with_context.MSIMG32 ref: 6460A4E6
        Strings
        • list_do_create, xrefs: 6460A4C7
        • n, xrefs: 6460A4D7
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c, xrefs: 6460A4CF
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c$list_do_create$n
        • API String ID: 1952898122-3791741500
        • Opcode ID: 93bbb9746d1e2876b9def7bff9e67122de862617ef887ae968cd142e0117dabf
        • Instruction ID: 9a891155fabcf612c4c5db10d9fb86f1f32c5d0f0e3d9b518431940f72e8650c
        • Opcode Fuzzy Hash: 93bbb9746d1e2876b9def7bff9e67122de862617ef887ae968cd142e0117dabf
        • Instruction Fuzzy Hash: 9C0149B04013418EE709DF05C258B16BEE0BF94318F46C698C4484F2B2E3BAC548CF96
        APIs
        • al_free_with_context.MSIMG32(?,?,?,?,?,?,00000000,645C1F6E), ref: 645FF75B
        Strings
        • Z, xrefs: 645FF750
        • al_fclose, xrefs: 645FF740
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\file.c, xrefs: 645FF748
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context
        • String ID: Z$al_fclose$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\file.c
        • API String ID: 3891110267-2780915165
        • Opcode ID: a60ec66eae86d10742619f0db1c9cd4867d5a795c8a1404be735fc773e4ef3ee
        • Instruction ID: e6db915b36a5815888a8a5fae08da547e8ea76096e31be4bd16732b91c87b37c
        • Opcode Fuzzy Hash: a60ec66eae86d10742619f0db1c9cd4867d5a795c8a1404be735fc773e4ef3ee
        • Instruction Fuzzy Hash: 4CE0E2B51087048FD700AF24CAC5A2ABBE4AF95706F41C95CE5991B302D339D4458F43
        APIs
        • al_malloc_with_context.MSIMG32(?,?,?,?,?,?,?,?,?,645CBF68), ref: 6462418E
        • _al_mutex_init.MSIMG32(?,?,?,?,?,?,?,?,?,645CBF68), ref: 646241A4
          • Part of subcall function 6466C464: InitializeCriticalSection.KERNEL32(?,?,?,?,?,645FF18C), ref: 6466C475
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\threads.c, xrefs: 64624177
        • al_create_mutex, xrefs: 6462416F
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalInitializeSection_al_mutex_inital_malloc_with_context
        • String ID: al_create_mutex$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\threads.c
        • API String ID: 1876999276-983446473
        • Opcode ID: 71ae4cb9aa60639c8403ab5cc20f37b813379760fe911796c8bd6b6592fc648f
        • Instruction ID: 1bfd3f29e66cf6a865e7195e84b73827b81c510baf58b59cfa42d3668cbbe2bf
        • Opcode Fuzzy Hash: 71ae4cb9aa60639c8403ab5cc20f37b813379760fe911796c8bd6b6592fc648f
        • Instruction Fuzzy Hash: 77E0B6B04087019EEB05DF26D98131ABBE0AF90744F41C81CE4948B345D779C149CF47
        APIs
        • _Unwind_GetRegionStart.MSIMG32(?,?,?,?,?,?,?,?,?,?,647D5A2D), ref: 647D468A
        • _Unwind_GetDataRelBase.MSIMG32(?,?,?,?,?,?,?,?,?,?,647D5A2D), ref: 647D46DD
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: Unwind_$BaseDataRegionStart
        • String ID:
        • API String ID: 1729040362-0
        • Opcode ID: f5ae3ec762c2a2afc9b70da09c811eb4c602040e15e1ffbd46ecde8e5eff9298
        • Instruction ID: 3e62480add65a856f3dc60cf2e06fa12017a7dfdc7771c199748a40efba546ad
        • Opcode Fuzzy Hash: f5ae3ec762c2a2afc9b70da09c811eb4c602040e15e1ffbd46ecde8e5eff9298
        • Instruction Fuzzy Hash: 3531F6716182018FD308CF39C59036ABBEBAFD6364F15896ED4E98B391DB36C44ADB41
        APIs
        • al_get_separate_blender.MSIMG32 ref: 646224D9
          • Part of subcall function 64625844: __emutls_get_address.MSIMG32(?,?,?,?,?,?,646028EB), ref: 6462585A
        • glEnable.OPENGL32 ref: 64622511
        • glBlendFunc.OPENGL32(00000000), ref: 6462252E
        • glEnable.OPENGL32 ref: 64622543
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: Enable$BlendFunc__emutls_get_addressal_get_separate_blender
        • String ID:
        • API String ID: 1456100686-0
        • Opcode ID: 219d46cc05f4a93b1cc36d46775d1a10bec7a25a18e12a1ce3a79a407bcba6a3
        • Instruction ID: 7ad37ef06012697a28275b5d847b5e75c5d2eb4ad6e270af4debfa16791c411a
        • Opcode Fuzzy Hash: 219d46cc05f4a93b1cc36d46775d1a10bec7a25a18e12a1ce3a79a407bcba6a3
        • Instruction Fuzzy Hash: AB418B766093409FC740EF68E18888EFBF4BB88715F50992EF9A4C7314E631E944CB82
        APIs
        • EnterCriticalSection.KERNEL32 ref: 645FE4FD
        • _al_cond_timedwait.MSIMG32 ref: 645FE522
        • _al_vector_ref.MSIMG32 ref: 645FE544
        • LeaveCriticalSection.KERNEL32(?), ref: 645FE572
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave_al_cond_timedwait_al_vector_ref
        • String ID:
        • API String ID: 4261550731-0
        • Opcode ID: 716e76f4f33016b6ba7f91e0f182b1a9aba197964ba7554f2ae5617817c6053b
        • Instruction ID: 301f0d55eecff1c56995216cc2601143ba4cd9d73105e9f8f38774fca7527d6f
        • Opcode Fuzzy Hash: 716e76f4f33016b6ba7f91e0f182b1a9aba197964ba7554f2ae5617817c6053b
        • Instruction Fuzzy Hash: EB1160B06083018BDB44DF2998C065A7BE5EF89344F118969E8988B205E730EC46DF93
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_lock_mutexal_unlock_mutex
        • String ID:
        • API String ID: 2451852483-0
        • Opcode ID: eba26191b8e5e882f9321618bc31f5cd50f84c3a51b6ff5725c4400db657c72b
        • Instruction ID: aaf06af8bd1122f1cb1aaabeba6d8146d6460b12c8d953e596c1eda73935668e
        • Opcode Fuzzy Hash: eba26191b8e5e882f9321618bc31f5cd50f84c3a51b6ff5725c4400db657c72b
        • Instruction Fuzzy Hash: 091125B420A3819FCB05DFB985C456ABFE0AF59204F45688DECD48B312D335C499DFA2
        APIs
        • GetContextSuspended.MSIMG32 ref: 646970D5
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 646970F0
        • alSetError.MSIMG32 ref: 64697104
        • alSetError.MSIMG32 ref: 6469712B
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 65270113-0
        • Opcode ID: bab3da4ffe5dbb8b93d47ecdf7ce71128e69a3095a96e0dfa2adc238dc004c97
        • Instruction ID: 074ef16ee910a4bfb6013da3be91bdb070a5056dc18250bbfcec4e03192aeeed
        • Opcode Fuzzy Hash: bab3da4ffe5dbb8b93d47ecdf7ce71128e69a3095a96e0dfa2adc238dc004c97
        • Instruction Fuzzy Hash: 53F054B15093428BE700BF28988518FBBE0BF45318F494A7ED8C95B302D7B9D445D7D6
        APIs
        • GetContextSuspended.MSIMG32 ref: 64697149
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,?,?,?,?,6468D754), ref: 6469CD3B
          • Part of subcall function 6469CD30: TlsGetValue.KERNEL32(00000000,?,?,?,?,?,6468D754), ref: 6469CD49
          • Part of subcall function 6469CD30: EnterCriticalSection.KERNEL32(?,00000000,?,?,?,?,?,6468D754), ref: 6469CD5C
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDA3
          • Part of subcall function 6469CD30: TlsSetValue.KERNEL32(?,00000000), ref: 6469CDB9
          • Part of subcall function 6469CD30: LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,?,?,?,?,6468D754), ref: 6469CDD2
        • LookupUIntMapKey.MSIMG32 ref: 64697164
        • alSetError.MSIMG32 ref: 64697178
        • alSetError.MSIMG32 ref: 6469719F
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLeaveValue$ContextLookupSuspended
        • String ID:
        • API String ID: 65270113-0
        • Opcode ID: bab3da4ffe5dbb8b93d47ecdf7ce71128e69a3095a96e0dfa2adc238dc004c97
        • Instruction ID: e981748186afd8d278ef74dc59c4548347b3a8bd90ab12af77d19c10d11bb6e8
        • Opcode Fuzzy Hash: bab3da4ffe5dbb8b93d47ecdf7ce71128e69a3095a96e0dfa2adc238dc004c97
        • Instruction Fuzzy Hash: F9F030B15093428BE700BF28988418EBBE0BF45318F49497ED8C94B202D7B9D445D796
        APIs
        • _al_mutex_init.MSIMG32 ref: 646694FE
          • Part of subcall function 6466C464: InitializeCriticalSection.KERNEL32(?,?,?,?,?,645FF18C), ref: 6466C475
        • QueryPerformanceFrequency.KERNEL32 ref: 6466950A
        • QueryPerformanceCounter.KERNEL32 ref: 64669537
        • timeGetTime.WINMM ref: 6466955E
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: PerformanceQuery$CounterCriticalFrequencyInitializeSectionTime_al_mutex_inittime
        • String ID:
        • API String ID: 919568344-0
        • Opcode ID: c0c7b7efee7bf35bd0bfcca0e62630ee600daff1bb751c27d2312bd683008aa6
        • Instruction ID: 7325077a2ce053db72ad62e19ad911d6d12d72d221a10dc8b49d65e74c0faa38
        • Opcode Fuzzy Hash: c0c7b7efee7bf35bd0bfcca0e62630ee600daff1bb751c27d2312bd683008aa6
        • Instruction Fuzzy Hash: 6C0172F4408712CBEB40DF6DC1A97597BE4EB69628F40181DE898A7301E3349189CFA3
        APIs
        • _al_vector_ref_back.MSIMG32 ref: 645CE65F
        • _al_vector_delete_at.MSIMG32 ref: 645CE67F
        • _al_vector_free.MSIMG32 ref: 645CE694
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: _al_vector_delete_at_al_vector_free_al_vector_ref_back
        • String ID:
        • API String ID: 3763777568-0
        • Opcode ID: 943e79eed26ae0ceab7b726c479973ff21cd3ae0fcb2067619e10c5a2855e01a
        • Instruction ID: 926ec68432e546a21eebca6e97e7dd31b93f789a6683265501b73da0f7730482
        • Opcode Fuzzy Hash: 943e79eed26ae0ceab7b726c479973ff21cd3ae0fcb2067619e10c5a2855e01a
        • Instruction Fuzzy Hash: 96F05EB85386508FDB51EFACA1A115CBFE0EB26704F81492CD284C7721D7309556EB97
        APIs
        • al_store_state.MSIMG32 ref: 645CF07D
          • Part of subcall function 64625D6C: __emutls_get_address.MSIMG32 ref: 64625D82
        • al_set_new_bitmap_flags.MSIMG32 ref: 645CF089
          • Part of subcall function 64625A40: __emutls_get_address.MSIMG32 ref: 64625A51
        • al_set_new_bitmap_format.MSIMG32 ref: 645CF095
          • Part of subcall function 64625978: __emutls_get_address.MSIMG32 ref: 64625984
        • al_load_bitmap.MSIMG32 ref: 645CF0A4
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: __emutls_get_address$al_load_bitmapal_set_new_bitmap_flagsal_set_new_bitmap_formatal_store_state
        • String ID:
        • API String ID: 1278721789-0
        • Opcode ID: cfa58cd8a80f06395766928dbdeafced68ef1e3ded010a25acf7c7a4ea158a5d
        • Instruction ID: b1c8036d4e5ece54fff24ae394037d8ff83f56cb1b2536d4e6efe70b3be1a8b3
        • Opcode Fuzzy Hash: cfa58cd8a80f06395766928dbdeafced68ef1e3ded010a25acf7c7a4ea158a5d
        • Instruction Fuzzy Hash: C2E0ECB0409750ABE3206F60C44976FBEE8AF41748F010C0CA4C847245C77854458B9B
        APIs
        • al_realloc_with_context.MSIMG32 ref: 645C1787
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\flac.c, xrefs: 645C176B
        • write_callback, xrefs: 645C1763
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_realloc_with_context
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\acodec\flac.c$write_callback
        • API String ID: 3259472294-332495956
        • Opcode ID: c73fe7831f11a9184b7ced93dc4ba2ef567865fef24fe93ff5946f94bfc68af7
        • Instruction ID: cdd90a2170d2a85ee914c281c7185bf531e34309a9d9dd71ea0dde9277dadb92
        • Opcode Fuzzy Hash: c73fe7831f11a9184b7ced93dc4ba2ef567865fef24fe93ff5946f94bfc68af7
        • Instruction Fuzzy Hash: E4A11E35A083458FCB14CF59C58099ABBE2FF89358F558A6DF88AA7311D330E951CF82
        APIs
        • al_free_with_context.MSIMG32 ref: 645C58A3
        Strings
        • _dsound_load_voice, xrefs: 645C5888
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\dsound.cpp, xrefs: 645C5890
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context
        • String ID: _dsound_load_voice$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\dsound.cpp
        • API String ID: 3891110267-4045805578
        • Opcode ID: a6f65c24fce3d4c104d2a533c97624ace96a43e8b8d4f8528df676ca6af7a397
        • Instruction ID: 23d4868becd82f12cfba38a5881a082659cb7ba014b6b74bb6920b0392e4c802
        • Opcode Fuzzy Hash: a6f65c24fce3d4c104d2a533c97624ace96a43e8b8d4f8528df676ca6af7a397
        • Instruction Fuzzy Hash: 9E5103B56083008FD708DF69D18465ABBE0FF88314F048A6EE8899B355E775E948CF86
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID:
        • String ID: /$Out of memory
        • API String ID: 0-4188590783
        • Opcode ID: 6e4329ee63dd591d4c191b6c2e3c0f17dcb2645e43b9d4bb32126cd5a0f44465
        • Instruction ID: 4138c8e4f24be1984ffb92626855395c41b538dd5c3f40eaaa69c61779b34122
        • Opcode Fuzzy Hash: 6e4329ee63dd591d4c191b6c2e3c0f17dcb2645e43b9d4bb32126cd5a0f44465
        • Instruction Fuzzy Hash: C121CF717197408FE340AFB98E9462EBBE1EF85325F15492CF894C7781DB31C8419BA2
        APIs
        • al_realloc_with_context.MSIMG32 ref: 646044A9
        Strings
        • _al_ballocmin, xrefs: 6460448A
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c, xrefs: 64604492
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_realloc_with_context
        • String ID: _al_ballocmin$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\bstrlib.c
        • API String ID: 3259472294-3235366453
        • Opcode ID: ad0cd588fac4691eb1fc00d7f8fb875435daaa3c4e282b4eac84209d80f2d266
        • Instruction ID: ac9d00e4f061fbf107edf3927f0f9cebd97e87bfbc7246a28376baf6a3e367be
        • Opcode Fuzzy Hash: ad0cd588fac4691eb1fc00d7f8fb875435daaa3c4e282b4eac84209d80f2d266
        • Instruction Fuzzy Hash: E911E5715083114BEB28AE15A6C026A77D0EBB1B24F1AC75DE8689F244D3B0C8D0CB92
        APIs
        • al_malloc_with_context.MSIMG32 ref: 6460A7B6
        Strings
        • list_create_item, xrefs: 6460A798
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c, xrefs: 6460A7A0
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c$list_create_item
        • API String ID: 1952898122-1382902512
        • Opcode ID: a0e5e94efcc9d716c4706adf3afbd5016accb0d829eee7b3f5938119101ae063
        • Instruction ID: be60a3961ca04509adedaec9c6219fa01ba488a30bf49f0c57cd27bb04ac3c94
        • Opcode Fuzzy Hash: a0e5e94efcc9d716c4706adf3afbd5016accb0d829eee7b3f5938119101ae063
        • Instruction Fuzzy Hash: F40190B86057008FDB08DF19D284A16BBF4FF98754B19CA9DD8998B326D330E841CF92
        APIs
        • al_malloc_with_context.MSIMG32 ref: 6460A746
        Strings
        • list_create_item, xrefs: 6460A728
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c, xrefs: 6460A730
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c$list_create_item
        • API String ID: 1952898122-1382902512
        • Opcode ID: 65ec21784a4fb4f3eb1da1f7eb777cced725470788596bc6b9fd9b250d9feb3e
        • Instruction ID: d1a455518a6eeae5ed75c2fd3ec7cad520c4ddab69bb94f29c44ba1bd68a0971
        • Opcode Fuzzy Hash: 65ec21784a4fb4f3eb1da1f7eb777cced725470788596bc6b9fd9b250d9feb3e
        • Instruction Fuzzy Hash: 5201AEB86057008FDB04DF19D284A07BBF4BF98744B1ACA9DD8984B31AD330E841CF92
        APIs
        • al_malloc_with_context.MSIMG32 ref: 6460A826
        Strings
        • list_create_item, xrefs: 6460A808
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c, xrefs: 6460A810
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_malloc_with_context
        • String ID: d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\list.c$list_create_item
        • API String ID: 1952898122-1382902512
        • Opcode ID: 1b45beb5f4d006d4bd6189ae8e180cdd5aca486e5964f400b11f31723f9e49e7
        • Instruction ID: 13844e91bb1ffe68fa010b098c77fb5ce20ed5957ca9c90b815001eedc968354
        • Opcode Fuzzy Hash: 1b45beb5f4d006d4bd6189ae8e180cdd5aca486e5964f400b11f31723f9e49e7
        • Instruction Fuzzy Hash: 0A01A2B46057018FDB14DF19D684A06BBE4FF98754B16CA99D8988B326D330E841CF91
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: ErrorS_set
        • String ID: Already initialized$ctSound8
        • API String ID: 1705320395-1688943339
        • Opcode ID: 1307332c5f85a5f8e09a8c2f4533936c070dff77c1a896e7fad90897377c6c2d
        • Instruction ID: 2dd49b2b33a6c63b4d1da9f32953d53826089691c82cb0da82474d73ca39297e
        • Opcode Fuzzy Hash: 1307332c5f85a5f8e09a8c2f4533936c070dff77c1a896e7fad90897377c6c2d
        • Instruction Fuzzy Hash: 6BF065A3B0516147DF41AA2DB81128F3391DB91225F8B05B9E845DB748F665C8C1DBE2
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CloseErrorHandleS_set
        • String ID: irectSoundCapture
        • API String ID: 3715666886-4189381426
        • Opcode ID: 7dda15599011f63b213752b47126f2f82bd68824eaa3766037603912e5e816fe
        • Instruction ID: 73dcec4594e41c8f51987a8b85b35d3f79f241e6f92805f6de15d423d82f1c9b
        • Opcode Fuzzy Hash: 7dda15599011f63b213752b47126f2f82bd68824eaa3766037603912e5e816fe
        • Instruction Fuzzy Hash: 16E0ECF151670A4FDB007F7888D851E7BE4AF45245F810C9CE88487342E73980908BA6
        APIs
        • al_free_with_context.MSIMG32 ref: 6460B456
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\vector.c, xrefs: 6460B443
        • _al_vector_free, xrefs: 6460B43B
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context
        • String ID: _al_vector_free$d:\Libraries\build\allegro\src\allegro-git\allegro-git\src\misc\vector.c
        • API String ID: 3891110267-501157153
        • Opcode ID: c25dc08dce8457cfd33bcfc512d42d1d109220699860616a21e6ab7eb62ef5fe
        • Instruction ID: b97eed7535136df4fed3a77349134c1b7bed51c8029776dec47709e45326220d
        • Opcode Fuzzy Hash: c25dc08dce8457cfd33bcfc512d42d1d109220699860616a21e6ab7eb62ef5fe
        • Instruction Fuzzy Hash: A6E0B6F0504300DBEB009F14CAD571ABBE4BB90709F45C58CD8884F346D379C4448FA6
        APIs
        • al_free_with_context.MSIMG32 ref: 645C555E
        Strings
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\dsound.cpp, xrefs: 645C5548
        • _dsound_deallocate_voice, xrefs: 645C5540
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context
        • String ID: _dsound_deallocate_voice$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\dsound.cpp
        • API String ID: 3891110267-3731721041
        • Opcode ID: 28927d8042de5e4806c5bc53fbf28f7e6b36f03ce72f995022d82fe95bef4869
        • Instruction ID: 486168d7388c85e39e35adbd9132b0623272262885e37b2c1cb3f0a22497ad92
        • Opcode Fuzzy Hash: 28927d8042de5e4806c5bc53fbf28f7e6b36f03ce72f995022d82fe95bef4869
        • Instruction Fuzzy Hash: 69D017F45083008BC700AF14D5C570A7BF0AB58318F618A4CE8880B306D334C4949FC2
        APIs
        • al_free_with_context.MSIMG32 ref: 645CC802
        Strings
        • _openal_deallocate_voice, xrefs: 645CC7E4
        • d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\openal.c, xrefs: 645CC7EC
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: al_free_with_context
        • String ID: _openal_deallocate_voice$d:\Libraries\build\allegro\src\allegro-git\allegro-git\addons\audio\openal.c
        • API String ID: 3891110267-1465153062
        • Opcode ID: 613ffe57799bd63da45c6f47dccb8222fdc94faecef7ac681f613eabb4a8cb90
        • Instruction ID: ac8d5e34146807a966b69afd112f47d0c5fe2a70945cf6b593c7b46b4c851953
        • Opcode Fuzzy Hash: 613ffe57799bd63da45c6f47dccb8222fdc94faecef7ac681f613eabb4a8cb90
        • Instruction Fuzzy Hash: 24D067F44047449BDB01AF94DAC571A7BE4BB98319F918A4CE8880B346D335D495CF8A
        APIs
        • _al_mutex_init.MSIMG32 ref: 646245CA
          • Part of subcall function 6466C464: InitializeCriticalSection.KERNEL32(?,?,?,?,?,645FF18C), ref: 6466C475
        • _al_add_exit_func.MSIMG32 ref: 646245DE
          • Part of subcall function 645FF32C: al_malloc_with_context.MSIMG32(?,?,?,?,?,?,?,645C49EF,?,?,?,?,?,?,645C1275), ref: 645FF36F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1847851213.00000000645C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 645C0000, based on PE: true
        • Associated: 00000000.00000002.1847831521.00000000645C0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848012522.00000000647DA000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848030857.00000000647E4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848088957.0000000064871000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848116974.0000000064877000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848135612.0000000064878000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848153998.000000006487A000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848182422.00000000648A0000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848199717.00000000648A1000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.00000000648B7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.000000006493E000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1848220258.0000000064979000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_645c0000_loaddll32.jbxd
        Similarity
        • API ID: CriticalInitializeSection_al_add_exit_func_al_mutex_inital_malloc_with_context
        • String ID: shutdown_timers
        • API String ID: 1272870373-3975819185
        • Opcode ID: bf667e19e445fa3572d3cf26f1f084003c35b23e040c441d6c0238d592b6cbcc
        • Instruction ID: 604ffd586f1e502460bbbe4563e1ef61e7605f3ddd4e4a76dad24c3004dbd4b7
        • Opcode Fuzzy Hash: bf667e19e445fa3572d3cf26f1f084003c35b23e040c441d6c0238d592b6cbcc
        • Instruction Fuzzy Hash: D5C08CB1404B009ACA42BF94451212DB960AD60604FD5584CC88007305D6308609DB27