Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
praxisbackup.exe

Overview

General Information

Sample name:praxisbackup.exe
Analysis ID:1541092
MD5:dbf8fe8bde46ead1bc550a03ad4a3f74
SHA1:888f27dd2269119cf9524474a6a0b559d0d201a1
SHA256:ca601708a3822d4f1fbea39171c8d5e94c0b8741f35a5a2fb63cd6d71da29b1a
Tags:exeMS4Killeruser-smica83
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Sample is not signed and drops a device driver
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Creates or modifies windows services
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables driver privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • praxisbackup.exe (PID: 4136 cmdline: "C:\Users\user\Desktop\praxisbackup.exe" MD5: DBF8FE8BDE46EAD1BC550A03AD4A3F74)
    • WerFault.exe (PID: 1020 cmdline: C:\Windows\system32\WerFault.exe -u -p 4136 -s 488 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 4060 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 5012 cmdline: C:\Windows\system32\WerFault.exe -pss -s 476 -p 4136 -ip 4136 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, ProcessId: 4060, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: praxisbackup.exeAvira: detected
Source: praxisbackup.exeReversingLabs: Detection: 52%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.8% probability
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218BB80 BCryptGenRandom,GetCurrentProcessId,BCryptGenRandom,HeapFree,CreateNamedPipeW,GetLastError,BCryptGenRandom,BCryptGenRandom,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,BCryptGenRandom,HeapFree,0_2_00007FF64218BB80
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642192750 BCryptGenRandom,0_2_00007FF642192750
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642192730 BCryptGenRandom,0_2_00007FF642192730
Source: praxisbackup.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: c:\itm_mon\itm_mon_3.0.0.4\driver\objfre_wlh_amd64\amd64\Probmon.pdb source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.dr
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642181A20 GetFileInformationByHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,FindFirstFileW,FindClose,HeapFree,0_2_00007FF642181A20
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421A08D8 FindFirstFileExW,0_2_00007FF6421A08D8
Source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
Source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
Source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0N
Source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drString found in binary or memory: http://secure.globalsign.net/cacert/ObjectSign.crt09
Source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drString found in binary or memory: http://secure.globalsign.net/cacert/PrimObject.crt0
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drString found in binary or memory: http://www.globalsign.net/repository/0
Source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drString found in binary or memory: http://www.globalsign.net/repository09
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642161C00 FilterConnectCommunicationPort,GetCommandLineW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,OpenSCManagerW,OpenServiceW,FilterLoad,CloseServiceHandle,CloseServiceHandle,HeapFree,GlobalMemoryStatusEx,GetLastError,K32GetPerformanceInfo,PdhCollectQueryData,PdhOpenQueryA,HeapFree,NtQuerySystemInformation,HeapFree,HeapFree,HeapFree,AcquireSRWLockExclusive,HeapFree,Sleep,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,Sleep,FilterConnectCommunicationPort,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,PdhRemoveCounter,CloseHandle,GetLastError,HeapFree,PdhCloseQuery,HeapFree,HeapFree,HeapFree,FilterSendMessage,HeapFree,CloseHandle,HeapFree,HeapFree,0_2_00007FF642161C00
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642179610 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_00007FF642179610
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421963E0 NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,HeapFree,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,VirtualQueryEx,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,VirtualQueryEx,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetProcessTimes,GetLastError,GetSystemTimes,GetLastError,GetProcessIoCounters,GetProcessMemoryInfo,GetLastError,GetLastError,GetModuleFileNameExW,HeapFree,0_2_00007FF6421963E0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642197A50 NtQueryInformationProcess,NtQueryInformationProcess,HeapFree,HeapFree,0_2_00007FF642197A50
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421637C9 NtQuerySystemInformation,0_2_00007FF6421637C9
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64216381D HeapFree,NtQuerySystemInformation,0_2_00007FF64216381D
Source: C:\Users\user\Desktop\praxisbackup.exeFile created: C:\Windows\System32\Drivers\Sysprox.sysJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeFile created: C:\Windows\System32\Drivers\Sysprox.sysJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeFile created: C:\Windows\System32\Drivers\Sysprox.sysJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421993500_2_00007FF642199350
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642161C2B0_2_00007FF642161C2B
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642161C000_2_00007FF642161C00
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218BB800_2_00007FF64218BB80
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421963E00_2_00007FF6421963E0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64216CC200_2_00007FF64216CC20
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642163C3B0_2_00007FF642163C3B
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421984500_2_00007FF642198450
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218A4B00_2_00007FF64218A4B0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421654B80_2_00007FF6421654B8
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64217ACC00_2_00007FF64217ACC0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421769700_2_00007FF642176970
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421941400_2_00007FF642194140
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421719900_2_00007FF642171990
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64217C1900_2_00007FF64217C190
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421991C00_2_00007FF6421991C0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421932100_2_00007FF642193210
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421682800_2_00007FF642168280
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421AC2C00_2_00007FF6421AC2C0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421942C00_2_00007FF6421942C0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421AB2D00_2_00007FF6421AB2D0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64219EF400_2_00007FF64219EF40
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421A97B00_2_00007FF6421A97B0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64217D8700_2_00007FF64217D870
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421830B50_2_00007FF6421830B5
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421928800_2_00007FF642192880
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421700900_2_00007FF642170090
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421800900_2_00007FF642180090
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421A08D80_2_00007FF6421A08D8
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421709200_2_00007FF642170920
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64216B9100_2_00007FF64216B910
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642195D600_2_00007FF642195D60
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642198D600_2_00007FF642198D60
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64216ADA00_2_00007FF64216ADA0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218B5B00_2_00007FF64218B5B0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64217C5B00_2_00007FF64217C5B0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218A6600_2_00007FF64218A660
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421A7EA80_2_00007FF6421A7EA8
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64217CEF00_2_00007FF64217CEF0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218F6D00_2_00007FF64218F6D0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421887200_2_00007FF642188720
Source: C:\Users\user\Desktop\praxisbackup.exeProcess token adjusted: Load DriverJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: String function: 00007FF642168810 appears 78 times
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 476 -p 4136 -ip 4136
Source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprobmon.sys4 vs praxisbackup.exe
Source: classification engineClassification label: mal72.evad.winEXE@7/8@0/0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64217ACC0 GetModuleHandleW,FormatMessageW,GetLastError,HeapFree,HeapFree,0_2_00007FF64217ACC0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642161C2B FilterConnectCommunicationPort,HeapFree,GetCurrentProcessId,FilterSendMessage,HeapFree,CloseHandle,HeapFree,GetProcessHeap,HeapFree,GetCommandLineW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetCurrentProcess,OpenProcessToken,HeapFree,LookupPrivilegeValueW,HeapFree,AdjustTokenPrivileges,HeapFree,CloseHandle,HeapFree,HeapFree,HeapFree,OpenSCManagerW,HeapFree,OpenServiceW,GetLastError,CreateServiceW,HeapFree,RegOpenKeyW,HeapFree,RegCreateKeyW,HeapFree,RegCreateKeyW,HeapFree,RegSetValueExW,HeapFree,RegSetValueExW,HeapFree,HeapFree,FilterLoad,CloseServiceHandle,HeapFree,CloseServiceHandle,HeapFree,HeapFree,GlobalMemoryStatusEx,GetLastError,K32GetPerformanceInfo,PdhCollectQueryData,HeapFree,HeapFree,0_2_00007FF642161C2B
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642161C00 FilterConnectCommunicationPort,GetCommandLineW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,OpenSCManagerW,OpenServiceW,FilterLoad,CloseServiceHandle,CloseServiceHandle,HeapFree,GlobalMemoryStatusEx,GetLastError,K32GetPerformanceInfo,PdhCollectQueryData,PdhOpenQueryA,HeapFree,NtQuerySystemInformation,HeapFree,HeapFree,HeapFree,AcquireSRWLockExclusive,HeapFree,Sleep,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,Sleep,FilterConnectCommunicationPort,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,PdhRemoveCounter,CloseHandle,GetLastError,HeapFree,PdhCloseQuery,HeapFree,HeapFree,HeapFree,FilterSendMessage,HeapFree,CloseHandle,HeapFree,HeapFree,0_2_00007FF642161C00
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: FilterConnectCommunicationPort,HeapFree,GetCurrentProcessId,FilterSendMessage,HeapFree,CloseHandle,HeapFree,GetProcessHeap,HeapFree,GetCommandLineW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetCurrentProcess,OpenProcessToken,HeapFree,LookupPrivilegeValueW,HeapFree,AdjustTokenPrivileges,HeapFree,CloseHandle,HeapFree,HeapFree,HeapFree,OpenSCManagerW,HeapFree,OpenServiceW,GetLastError,CreateServiceW,HeapFree,RegOpenKeyW,HeapFree,RegCreateKeyW,HeapFree,RegCreateKeyW,HeapFree,RegSetValueExW,HeapFree,RegSetValueExW,HeapFree,HeapFree,FilterLoad,CloseServiceHandle,HeapFree,CloseServiceHandle,HeapFree,HeapFree,GlobalMemoryStatusEx,GetLastError,K32GetPerformanceInfo,PdhCollectQueryData,HeapFree,HeapFree,0_2_00007FF642161C2B
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:5012:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4136
Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\04940959-5de7-442f-b0ab-e767a510a4d1Jump to behavior
Source: praxisbackup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\praxisbackup.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: praxisbackup.exeReversingLabs: Detection: 52%
Source: unknownProcess created: C:\Users\user\Desktop\praxisbackup.exe "C:\Users\user\Desktop\praxisbackup.exe"
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 476 -p 4136 -ip 4136
Source: C:\Users\user\Desktop\praxisbackup.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4136 -s 488
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 476 -p 4136 -ip 4136Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4136 -s 488Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeSection loaded: fltlib.dllJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: praxisbackup.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: praxisbackup.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: praxisbackup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\itm_mon\itm_mon_3.0.0.4\driver\objfre_wlh_amd64\amd64\Probmon.pdb source: praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.dr
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218F6D0 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,RtlCaptureContext,RtlLookupFunctionEntry,GetCurrentProcessId,CreateMutexA,CloseHandle,WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,GetProcAddress,ReleaseMutex,RtlVirtualUnwind,HeapFree,GetLastError,HeapFree,HeapFree,0_2_00007FF64218F6D0
Source: praxisbackup.exeStatic PE information: section name: _RDATA

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\praxisbackup.exeFile created: C:\Windows\System32\Drivers\Sysprox.sysJump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeFile created: C:\Windows\System32\drivers\Sysprox.sysJump to dropped file
Source: C:\Users\user\Desktop\praxisbackup.exeFile created: C:\Windows\System32\drivers\Sysprox.sysJump to dropped file
Source: C:\Users\user\Desktop\praxisbackup.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Sysprox\InstancesJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\praxisbackup.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_0-33367
Source: C:\Users\user\Desktop\praxisbackup.exeDropped PE file which has not been started: C:\Windows\System32\drivers\Sysprox.sysJump to dropped file
Source: C:\Users\user\Desktop\praxisbackup.exeAPI coverage: 5.9 %
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642181A20 GetFileInformationByHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,FindFirstFileW,FindClose,HeapFree,0_2_00007FF642181A20
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421A08D8 FindFirstFileExW,0_2_00007FF6421A08D8
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642192880 HeapFree,GetSystemInfo,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,0_2_00007FF642192880
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\praxisbackup.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-33367
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64219A790 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF64219A790
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218F6D0 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,RtlCaptureContext,RtlLookupFunctionEntry,GetCurrentProcessId,CreateMutexA,CloseHandle,WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,GetProcAddress,ReleaseMutex,RtlVirtualUnwind,HeapFree,GetLastError,HeapFree,HeapFree,0_2_00007FF64218F6D0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642199350 GetProcessHeap,HeapAlloc,SysFreeString,SysStringLen,FormatMessageW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00007FF642199350
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421A842C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6421A842C
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64219A938 SetUnhandledExceptionFilter,0_2_00007FF64219A938
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64219A790 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF64219A790
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64219FE9C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF64219FE9C
Source: C:\Users\user\Desktop\praxisbackup.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 476 -p 4136 -ip 4136Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4136 -s 488Jump to behavior
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421A7CF0 cpuid 0_2_00007FF6421A7CF0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF64218BB80 BCryptGenRandom,GetCurrentProcessId,BCryptGenRandom,HeapFree,CreateNamedPipeW,GetLastError,BCryptGenRandom,BCryptGenRandom,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,BCryptGenRandom,HeapFree,0_2_00007FF64218BB80
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF6421963E0 NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,HeapFree,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,HeapFree,GetLastError,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,VirtualQueryEx,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,VirtualQueryEx,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,GetProcessTimes,GetLastError,GetSystemTimes,GetLastError,GetProcessIoCounters,GetProcessMemoryInfo,GetLastError,GetLastError,GetModuleFileNameExW,HeapFree,0_2_00007FF6421963E0
Source: C:\Users\user\Desktop\praxisbackup.exeCode function: 0_2_00007FF642197CD1 HeapFree,HeapFree,RtlGetVersion,0_2_00007FF642197CD1
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
Native API
21
Windows Service
1
Access Token Manipulation
3
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
LSASS Driver
21
Windows Service
1
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
12
Process Injection
1
Disable or Modify Tools
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
LSASS Driver
1
Access Token Manipulation
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
12
Process Injection
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain Credentials114
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Obfuscated Files or Information
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
praxisbackup.exe53%ReversingLabsWin64.Trojan.Generic
praxisbackup.exe100%AviraTR/Agent.ziksx
SourceDetectionScannerLabelLink
C:\Windows\System32\drivers\Sysprox.sys4%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://secure.globalsign.net/cacert/PrimObject.crt0praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drfalse
    unknown
    http://secure.globalsign.net/cacert/ObjectSign.crt09praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drfalse
      unknown
      http://upx.sf.netAmcache.hve.4.drfalse
      • URL Reputation: safe
      unknown
      http://www.globalsign.net/repository09praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drfalse
        unknown
        http://www.globalsign.net/repository/0praxisbackup.exe, 00000000.00000002.2174354870.000000D6B4CF5000.00000004.00000010.00020000.00000000.sdmp, Sysprox.sys.0.drfalse
          unknown
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1541092
          Start date and time:2024-10-24 12:07:05 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 32s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:praxisbackup.exe
          Detection:MAL
          Classification:mal72.evad.winEXE@7/8@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 21
          • Number of non-executed functions: 109
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded IPs from analysis (whitelisted): 20.42.73.29
          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • VT rate limit hit for: praxisbackup.exe
          TimeTypeDescription
          06:08:01API Interceptor1x Sleep call for process: WerFault.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Windows\System32\WerFault.exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):0.8003036856596354
          Encrypted:false
          SSDEEP:96:1B/FUtYUf50RsU7hqfUp7qabSKQXIDcQGc6aTcEYcw35nF+HbHg/opAnQVxj7OU7:DDJRqHB0osC0j1CizuiFfZ24lO8M5
          MD5:E4E30391A3AC425A15CEFE6B7BC4270B
          SHA1:875CA407E37F52A65C7179A17570ED84AB3E1EC2
          SHA-256:857D64934963626D489EB3C5874164B46719D4DDA065ED8056E43C1A1EA352B3
          SHA-512:6387F8C5AB64275599C7D8643B0681179A57C51AD96B870A3B92114DFF5E4BCCF9311B7DA227B2141FC501527D74DE3C6E8B1DFC40AE5BF0ED70C300DF3BD189
          Malicious:true
          Reputation:low
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.2.3.8.0.7.8.6.1.4.0.7.5.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.2.3.8.0.7.8.9.2.6.5.6.2.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.c.2.7.b.4.4.6.-.6.3.8.3.-.4.e.d.f.-.b.7.b.5.-.f.b.8.3.9.c.6.5.6.4.c.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.9.a.8.a.b.0.c.-.6.5.8.2.-.4.9.c.e.-.a.d.e.c.-.f.d.6.2.f.e.3.b.9.3.9.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.r.a.x.i.s.b.a.c.k.u.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.2.8.-.0.0.0.1.-.0.0.1.5.-.9.0.2.c.-.e.d.9.9.f.c.2.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.2.9.1.a.2.a.1.1.6.2.1.1.c.0.7.8.3.f.7.3.1.b.e.5.4.6.3.b.1.c.e.0.0.0.0.f.f.f.f.!.0.0.0.0.8.8.8.f.2.7.d.d.2.2.6.9.1.1.9.c.f.9.5.2.4.4.7.4.a.6.a.0.b.5.5.9.d.0.d.2.0.1.a.1.!.p.r.a.x.i.s.b.a.c.k.u.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.7././.2.
          Process:C:\Windows\System32\WerFault.exe
          File Type:Mini DuMP crash report, 15 streams, Thu Oct 24 10:07:58 2024, 0x1205a4 type
          Category:dropped
          Size (bytes):82532
          Entropy (8bit):1.7109558267026694
          Encrypted:false
          SSDEEP:192:h8kDJdQUVZl4S7OQu7clAVW1/He+Z7vflPHGhTfXf20Eu:h7QECQu7OAmfHGNfuru
          MD5:1C9C0B7CBAB35B81A9E063691F1E4B17
          SHA1:93FAD0AA7750E9E8E0AE8FCA49C0B7A45A2E45E1
          SHA-256:23A97CF4DEBEE6D62A09CB74C1AFCC481E3F92A288545558ED4A98D182F99005
          SHA-512:DD2F930BDD24A8390AE41E953EC361AB000EEC089FEC41BBCFA6EFBB7B5CC2C258CC37EA077F093AE12E8FA8A5D3EFADD898F6C7B4CB56FC0E5DE72AACB585BF
          Malicious:false
          Reputation:low
          Preview:MDMP..a..... .......~..g........................h................+..........`.......8...........T...........H..../..................................................................................................................eJ..............Lw......................T.......(...~..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):8610
          Entropy (8bit):3.695174274762487
          Encrypted:false
          SSDEEP:192:R6l7wVeJ+eP3rL6Y2DuiA5gmfK9pDM89b50Tgfzjim:R6lXJXP3rL6YziA5gmfKB500fnz
          MD5:A27AE78CD5F93AAFEE92FD3AAFE0A60F
          SHA1:1067FC04B0F17579ACEE463E6ED7D7EEA4F17D88
          SHA-256:2CF5D29FE39B2826ACAC7B58C8C346984D87691C13B5B92CE29FF92F1E44AFFA
          SHA-512:433412B8D277C07CC2C100BFC4AD356CCB2214FB72945EEA0B00F5B7E12601B31D57551CB00565A2B8082324BDC189A767ADB9C64A41B8CF8C58F8D7BA8D8A8B
          Malicious:false
          Reputation:low
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.1.3.6.<./.P.i.
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4770
          Entropy (8bit):4.434759248687144
          Encrypted:false
          SSDEEP:48:cvIwWl8zsXJg771I9ikwWpW8VY0Ym8M4JQoHhFSIoyq8vlHNvXVtsMXd:uIjf5I7UJ7VoJQ8uIoWtNvFtDXd
          MD5:6A4D41754AA66C47B93A307BBAEDB6EA
          SHA1:CABF23089547681AEA10AF838B9245F2EFD7BECC
          SHA-256:9D5FF394F5C064E9FB24865CEC2B146E43F023FA2DEF439598A4726D8E447581
          SHA-512:B8DDF0D8DC0DFFDC926F66B1439FC53C1E5DF7E4710808403F73F0DD6F0BD82BD8ECB6FA7E7DB4B052FD6726F7B52A0F0CF807ED2FCBAC894CC41E4004293A06
          Malicious:false
          Reputation:low
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="557350" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
          Process:C:\Windows\System32\svchost.exe
          File Type:data
          Category:dropped
          Size (bytes):75858
          Entropy (8bit):3.08239652802643
          Encrypted:false
          SSDEEP:1536:l5rTjwmhCXU2aMOQVavZQAIvumulCxznl0:l5rTjwmhCXU2aMOQVaBQAIvumulCxznK
          MD5:C68947A43DA933A02D10DC6501863A9D
          SHA1:DE7AD3D3CB1FFFA01AA5A1864341A24D0EDEE7D5
          SHA-256:5EB9B1100E3503FCF1D787A588FEE4988C9B16A45A03089711E16BBC71234B64
          SHA-512:B08A8E7F80C482B6106FF35CA2F2246B00249CA9284BB9C0AF2A277D2512745277F3568CD3EC86BA3717200E94878F875DD02DB09B57FE73E725E357A42C42B8
          Malicious:false
          Reputation:low
          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
          Process:C:\Windows\System32\svchost.exe
          File Type:data
          Category:dropped
          Size (bytes):13340
          Entropy (8bit):2.684535737226691
          Encrypted:false
          SSDEEP:96:TiZYW7Puya+zYRYRiWm5HFUYEZybtk0iVHlKV8wdj4xnyaBICM9acNIL93:2ZD7OMWmU3zdaBICM93SL93
          MD5:2C0A842216FB16D36C2B03DD596406C5
          SHA1:479CFAD5D33072FB541BA1DB7C57F86E1AA23FBB
          SHA-256:B838E2AE32872C21562E580366AC68B0018FA8CB9C736D18097F18ADDD4D49ED
          SHA-512:4D2FB7F2E75F3102E622B56F31C595D9A6D311C9745145F4FF737A85FDDEBB95E52E8EF0BDB332F7BF517894C91CB8DF7238402DA402E0F45B026BD00A57A758
          Malicious:false
          Reputation:low
          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
          Process:C:\Users\user\Desktop\praxisbackup.exe
          File Type:PE32+ executable (native) x86-64, for MS Windows
          Category:dropped
          Size (bytes):30864
          Entropy (8bit):6.396093720120602
          Encrypted:false
          SSDEEP:384:s33h+malYtzO7zmQ++jiPV+PQ6eg3OOAFN0rA1Ghj8mfFxf3xlSUYJLdSkjGZfdG:yx8YPoj8L6WOqGSfmb3C5Ltiq
          MD5:8C8C93A6B6C6D6E632A54877FC1A209E
          SHA1:7310D6399683BA3EB2F695A2071E0E45891D743B
          SHA-256:023D722CBBDD04E3DB77DE7E6E3CFEABCEF21BA5B2F04C3F3A33691801DD45EB
          SHA-512:E3EDC27A93979AE757CAB65169BBC82C4FF28C3262D3D7DA89A88A88D8D273260D2802EB1F1EABB9158A625CCA17119590C83567831F4C5A9243FE09DD5909D0
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 4%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%..pa..#a..#a..#h..#`..#h..#b..#a..#M..#FT.#d..#FT.#`..#h..#l..#h..#c..#FT.#`..#h..#`..#h..#`..#h..#`..#Richa..#........................PE..d...Q\.N.........."......F..........T...........................................................................................................<.......0....p..h....Z..............`Q...............................................P..`............................text....9.......:.................. ..h.rdata.......P.......>..............@..H.data........`.......D..............@....pdata..h....p.......F..............@..HINIT....0............H.............. ....rsrc...0............T..............@..B.reloc..l............X..............@..B................................................................................................................................................................................................
          Process:C:\Windows\System32\WerFault.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):1835008
          Entropy (8bit):4.468765901031446
          Encrypted:false
          SSDEEP:6144:RzZfpi6ceLPx9skLmb0f9ZWSP3aJG8nAgeiJRMMhA2zX4WABluuN3jDH5S:JZHt9ZWOKnMM6bFp9j4
          MD5:6D5FA8CB6F332E7E7C4DA2A066D7C376
          SHA1:E02DCA77F18BDF36532B5CD94ED2E8977E15B32F
          SHA-256:1AB2B95CEE914853C66A7A99852D5696074B94706954DBA1CB28C62C1F4CD58B
          SHA-512:7E148D78BA0EC87E844960C306809E7853EEF1A0E1A166A655B299590444E238D8458618ED5FA61C10F91744CEC1E753AFB4240A5D28957C102CD9BBAD0283E2
          Malicious:false
          Reputation:low
          Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.]...%..............................................................................................................................................................................................................................................................................................................................................t...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):6.500561305430131
          TrID:
          • Win64 Executable GUI (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:praxisbackup.exe
          File size:455'168 bytes
          MD5:dbf8fe8bde46ead1bc550a03ad4a3f74
          SHA1:888f27dd2269119cf9524474a6a0b559d0d201a1
          SHA256:ca601708a3822d4f1fbea39171c8d5e94c0b8741f35a5a2fb63cd6d71da29b1a
          SHA512:cfcaee08a31394c4275f397ed6e71fa8c0009204f0c9cbfd2afbfcac6cc9b0245b34546196f994012afcbbdd642e15ad24bd54c315dbc01d1f45d6e6e3b92ccb
          SSDEEP:6144:+21l/vZY5g2hjEP1HAdYn8EQaQuNVChDb0/ejTEM3KDpaCx+n36GBdPhow499:+233ZY59+zrnOPSeg1E8+nqQU
          TLSH:E5A46D56B69618FCE06AC07487479662B97674850F31BDEF02E4C6302F66AE16F3CF60
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........q=...S...S...S..hP...S..hV...S..hW...S..oV...S..oW...S..oP...S..hR...S...R.7.S...S...S...Q...S.Rich..S.................PE..d..
          Icon Hash:00928e8e8686b000
          Entrypoint:0x14003a370
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x66A223AC [Thu Jul 25 10:06:36 2024 UTC]
          TLS Callbacks:0x40017910, 0x1
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:37fe08ddc1d4080dbc99a7c5239f84e1
          Instruction
          dec eax
          sub esp, 28h
          call 00007F52E89094C8h
          dec eax
          add esp, 28h
          jmp 00007F52E8909047h
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          nop word ptr [eax+eax+00000000h]
          dec eax
          sub esp, 10h
          dec esp
          mov dword ptr [esp], edx
          dec esp
          mov dword ptr [esp+08h], ebx
          dec ebp
          xor ebx, ebx
          dec esp
          lea edx, dword ptr [esp+18h]
          dec esp
          sub edx, eax
          dec ebp
          cmovb edx, ebx
          dec esp
          mov ebx, dword ptr [00000010h]
          dec ebp
          cmp edx, ebx
          jnc 00007F52E89091E8h
          inc cx
          and edx, 8D4DF000h
          wait
          add al, dh
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x6a0dc0xdc.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6e0000x2c64.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000xb3c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x645600x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x645800x28.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x644200x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x4d0000x568.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x4c0000x4c000d383c507f0669d59dc3072fa7d1be25bFalse0.5349956311677632data6.367339784179062IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x4d0000x1e43e0x1e600f86dd3ef117d34ae5a3dbb746a1c7bccFalse0.5475742669753086data6.286081709132401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x6c0000x1e280xc00534bc851862c7bb90d1f63e918a2365dFalse0.14811197916666666data2.0534634817214195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x6e0000x2c640x2e00fa226992598a99845a4359c1a18260d9False0.49006453804347827data5.554780329580169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          _RDATA0x710000x15c0x2006516a0d0a52941e212f00c3abf77a223False0.40625data3.3597801501968023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x720000xb3c0xc00bcff3c31ad984a0c19f40e73aa8331a8False0.5475260416666666data5.31623579190179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          DLLImport
          ntdll.dllRtlUnwindEx, NtQuerySystemInformation, RtlGetVersion, NtQueryInformationProcess, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RtlNtStatusToDosError, NtWriteFile, RtlPcToFileHeader
          ADVAPI32.dllOpenSCManagerW, CopySid, GetLengthSid, IsValidSid, GetTokenInformation, SystemFunction036, CloseServiceHandle, RegSetValueExW, RegCreateKeyW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, CreateServiceW, OpenServiceW, RegOpenKeyW
          KERNEL32.dllGetCPInfo, WideCharToMultiByte, SetEnvironmentVariableW, SetStdHandle, GetFileType, GetStringTypeW, OpenProcess, HeapFree, CloseHandle, GetLastError, HeapReAlloc, GetCurrentProcessId, GetProcessHeap, GetCommandLineW, GetCurrentProcess, GlobalMemoryStatusEx, K32GetPerformanceInfo, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, Sleep, WaitForSingleObject, GetExitCodeProcess, AddVectoredExceptionHandler, SetThreadStackGuarantee, SwitchToThread, SleepConditionVariableSRW, WakeConditionVariable, WakeAllConditionVariable, GetSystemInfo, GetModuleHandleA, GetProcAddress, GetCurrentThread, TryAcquireSRWLockExclusive, GetStdHandle, GetConsoleMode, MultiByteToWideChar, WriteConsoleW, SetLastError, GetModuleHandleW, FormatMessageW, GetEnvironmentVariableW, GetModuleFileNameW, CreateFileW, SetFileInformationByHandle, GetFullPathNameW, GetFileInformationByHandle, GetFileInformationByHandleEx, FindFirstFileW, FindClose, GetEnvironmentStringsW, FreeEnvironmentStringsW, CompareStringOrdinal, GetSystemDirectoryW, GetWindowsDirectoryW, CreateProcessW, GetFileAttributesW, DuplicateHandle, InitializeProcThreadAttributeList, UpdateProcThreadAttribute, DeleteProcThreadAttributeList, CreateNamedPipeW, CreateThread, ReadFileEx, SleepEx, WriteFileEx, ExitProcess, GetSystemTimeAsFileTime, HeapAlloc, GetCurrentDirectoryW, CreateMutexA, WaitForSingleObjectEx, LoadLibraryA, ReleaseMutex, AcquireSRWLockShared, ReleaseSRWLockShared, GetProcessTimes, GetOEMCP, ReadProcessMemory, VirtualQueryEx, GetSystemTimes, GetProcessIoCounters, LocalFree, LoadLibraryExA, FreeLibrary, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, SetFilePointerEx, GetConsoleOutputCP, FlushFileBuffers, HeapSize, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, GetCommandLineA, FlsGetValue, GetModuleHandleExW, FlsAlloc, TerminateProcess, WriteFile, QueryPerformanceCounter, GetCurrentThreadId, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, EncodePointer, RaiseException, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW
          fltlib.dllFilterLoad, FilterSendMessage, FilterConnectCommunicationPort
          pdh.dllPdhCollectQueryData, PdhGetFormattedCounterValue, PdhAddEnglishCounterW, PdhOpenQueryA, PdhRemoveCounter, PdhCloseQuery
          bcrypt.dllBCryptGenRandom
          psapi.dllGetModuleFileNameExW, GetProcessMemoryInfo
          shell32.dllCommandLineToArgvW
          powrprof.dllCallNtPowerInformation
          oleaut32.dllGetErrorInfo, SysStringLen, SysFreeString
          TimestampSource PortDest PortSource IPDest IP
          Oct 24, 2024 12:08:41.695358992 CEST5361755162.159.36.2192.168.2.6
          Oct 24, 2024 12:08:42.434678078 CEST53567261.1.1.1192.168.2.6

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:06:07:58
          Start date:24/10/2024
          Path:C:\Users\user\Desktop\praxisbackup.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\praxisbackup.exe"
          Imagebase:0x7ff642160000
          File size:455'168 bytes
          MD5 hash:DBF8FE8BDE46EAD1BC550A03AD4A3F74
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:06:07:58
          Start date:24/10/2024
          Path:C:\Windows\System32\svchost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
          Imagebase:0x7ff7403e0000
          File size:55'320 bytes
          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:06:07:58
          Start date:24/10/2024
          Path:C:\Windows\System32\WerFault.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\WerFault.exe -pss -s 476 -p 4136 -ip 4136
          Imagebase:0x7ff67b750000
          File size:570'736 bytes
          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:4
          Start time:06:07:58
          Start date:24/10/2024
          Path:C:\Windows\System32\WerFault.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\WerFault.exe -u -p 4136 -s 488
          Imagebase:0x7ff67b750000
          File size:570'736 bytes
          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:5.3%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:41.4%
            Total number of Nodes:2000
            Total number of Limit Nodes:22
            execution_graph 29773 7ff64219a1f4 29794 7ff64219a458 29773->29794 29776 7ff64219a215 __scrt_acquire_startup_lock 29779 7ff64219a355 29776->29779 29785 7ff64219a233 __scrt_release_startup_lock 29776->29785 29777 7ff64219a34b 29839 7ff64219a790 7 API calls __FrameHandler3::FrameUnwindToEmptyState 29777->29839 29840 7ff64219a790 7 API calls __FrameHandler3::FrameUnwindToEmptyState 29779->29840 29781 7ff64219a258 29782 7ff64219a360 __FrameHandler3::FrameUnwindToEmptyState 29783 7ff64219a2de 29802 7ff64219e904 29783->29802 29785->29781 29785->29783 29836 7ff64219ecb0 47 API calls 29785->29836 29787 7ff64219a2e3 29808 7ff6421674f0 AddVectoredExceptionHandler 29787->29808 29789 7ff64219a300 29837 7ff64219a8e4 GetModuleHandleW 29789->29837 29792 7ff64219a307 29792->29782 29838 7ff64219a5ec 7 API calls __scrt_initialize_crt 29792->29838 29793 7ff64219a31e 29793->29781 29841 7ff64219aa24 29794->29841 29797 7ff64219a20d 29797->29776 29797->29777 29798 7ff64219a487 29843 7ff64219f400 29798->29843 29803 7ff64219e914 29802->29803 29807 7ff64219e929 29802->29807 29803->29807 29860 7ff64219e5a4 70 API calls __free_lconv_mon 29803->29860 29805 7ff64219e932 29805->29807 29861 7ff64219e76c 12 API calls 2 library calls 29805->29861 29807->29787 29809 7ff64216760f 29808->29809 29810 7ff642167520 SetThreadStackGuarantee 29808->29810 29942 7ff6421a8a40 29809->29942 29811 7ff642167535 GetLastError 29810->29811 29812 7ff642167544 29810->29812 29811->29812 29814 7ff642167657 29811->29814 29862 7ff642177c10 29812->29862 29818 7ff6421a8a40 74 API calls 29814->29818 29816 7ff642167644 29819 7ff6421676cc 29816->29819 29821 7ff6421676b9 HeapFree 29816->29821 29818->29816 29819->29789 29821->29819 29823 7ff642167646 29947 7ff6421a8970 29823->29947 29824 7ff642167571 29876 7ff642167860 29824->29876 29827 7ff642167594 29896 7ff642177ca0 29827->29896 29829 7ff6421675b2 29907 7ff642177ef0 29829->29907 29831 7ff6421675ba 29925 7ff642161000 29831->29925 29834 7ff642167604 29834->29789 29836->29783 29837->29792 29838->29793 29839->29779 29840->29782 29842 7ff64219a47a __scrt_dllmain_crt_thread_attach 29841->29842 29842->29797 29842->29798 29844 7ff6421a38dc 29843->29844 29845 7ff64219a48c 29844->29845 29848 7ff6421a2968 29844->29848 29845->29797 29847 7ff64219bf10 7 API calls 2 library calls 29845->29847 29847->29797 29859 7ff6421a235c EnterCriticalSection 29848->29859 29860->29805 29861->29807 29863 7ff642177c2a 29862->29863 29864 7ff642167555 29863->29864 29962 7ff64217a0b0 29863->29962 29871 7ff64218f680 29864->29871 29866 7ff642177c46 29867 7ff642177c5a 29866->29867 29868 7ff642177c66 GetCurrentThread SetThreadDescription 29866->29868 29982 7ff642177de0 HeapFree HeapFree 29867->29982 29868->29864 29870 7ff642177c86 HeapFree 29868->29870 29870->29864 29872 7ff64218f697 GetProcessHeap 29871->29872 29873 7ff64218f6ac HeapAlloc 29871->29873 29874 7ff642167568 29872->29874 29875 7ff64218f6a2 29872->29875 29873->29874 29874->29823 29874->29824 29875->29873 29883 7ff642167886 29876->29883 29889 7ff6421678f1 29876->29889 29877 7ff642167999 29993 7ff642167790 74 API calls 29877->29993 29880 7ff64216795e 29880->29827 29881 7ff642167936 HeapReAlloc 29881->29880 29884 7ff642167947 29881->29884 29882 7ff642167963 HeapFree 29882->29880 29883->29877 29986 7ff6421677d0 29883->29986 29887 7ff6421a8970 74 API calls 29884->29887 29886 7ff6421679f6 29886->29827 29891 7ff64216795c 29887->29891 29893 7ff642167909 29889->29893 29992 7ff642167a50 74 API calls 29889->29992 29890 7ff6421679e3 HeapFree 29890->29886 29891->29886 29891->29890 29892 7ff642167994 29892->29877 29894 7ff6421679a8 29892->29894 29893->29880 29893->29881 29893->29882 29895 7ff6421a8970 74 API calls 29894->29895 29895->29891 29897 7ff64218f680 2 API calls 29896->29897 29898 7ff642177ccd 29897->29898 29899 7ff642177d39 29898->29899 29900 7ff642177cd5 29898->29900 29901 7ff6421a8970 74 API calls 29899->29901 29904 7ff642177d13 29900->29904 29994 7ff6421aadd0 74 API calls 29900->29994 29902 7ff642177d37 29901->29902 29903 7ff642177d9f 29902->29903 29906 7ff642177d8c HeapFree 29902->29906 29903->29829 29904->29829 29906->29903 29908 7ff642177f27 29907->29908 29911 7ff642177f5d 29907->29911 29909 7ff642178027 29908->29909 29910 7ff642177f33 29908->29910 29913 7ff64217803a 29909->29913 30001 7ff64216c0b0 HeapFree HeapFree 29909->30001 29995 7ff642178360 74 API calls 29910->29995 29912 7ff642177f98 29911->29912 29996 7ff642168b60 29911->29996 29912->29831 30002 7ff6421a8ee0 29913->30002 29919 7ff642178017 30006 7ff642177de0 HeapFree HeapFree 29919->30006 29922 7ff64217807e 29923 7ff6421780b1 29922->29923 30007 7ff642177de0 HeapFree HeapFree 29922->30007 29923->29831 30153 7ff642163c3b 29925->30153 30368 7ff642165ed3 29925->30368 30541 7ff6421637c9 29925->30541 30753 7ff642161c2b 29925->30753 31238 7ff642161c00 29925->31238 31725 7ff642163f85 29925->31725 31941 7ff642163c05 29925->31941 32153 7ff642164f43 29925->32153 32314 7ff6421654b8 29925->32314 32470 7ff64216577c 29925->32470 32623 7ff64216381d 29925->32623 32838 7ff642164dda 29925->32838 33052 7ff6421649ba 29925->33052 33267 7ff64216465b ReleaseSRWLockExclusive 29925->33267 29926 7ff642161006 29926->29834 29941 7ff6421aa8a0 80 API calls 29926->29941 29941->29834 34042 7ff642191770 29942->34042 34096 7ff642167780 29947->34096 29963 7ff64217a10a 29962->29963 29964 7ff64217a0df 29962->29964 29983 7ff64217a2f0 74 API calls 29963->29983 29965 7ff64217a0ec 29964->29965 29966 7ff64217a21e 29964->29966 29969 7ff64218f680 2 API calls 29965->29969 29985 7ff642167790 74 API calls 29966->29985 29971 7ff64217a101 29969->29971 29970 7ff64217a223 29972 7ff6421a8970 74 API calls 29970->29972 29971->29963 29971->29970 29974 7ff64217a230 29972->29974 29973 7ff64217a1b1 29977 7ff64217a1f0 29973->29977 29978 7ff64217a1d0 HeapFree 29973->29978 29975 7ff64217a25c HeapFree 29974->29975 29976 7ff64217a26f 29974->29976 29975->29976 29976->29866 29977->29866 29978->29977 29979 7ff64217a1e1 29979->29977 29984 7ff64217a480 74 API calls 29979->29984 29981 7ff64217a138 29981->29973 29981->29979 29982->29864 29983->29981 29984->29977 29988 7ff6421677e1 29986->29988 29990 7ff642167809 29986->29990 29987 7ff64216780b 29987->29990 29991 7ff64218f680 2 API calls 29987->29991 29988->29987 29989 7ff6421677ef HeapReAlloc 29988->29989 29989->29990 29990->29889 29990->29892 29991->29990 29992->29893 29995->29911 29997 7ff642168cbb 29996->29997 29998 7ff642168baa 29996->29998 29997->29998 30008 7ff6421991c0 LoadLibraryExA 29997->30008 30072 7ff642199350 29997->30072 29998->29919 30005 7ff642177de0 HeapFree HeapFree 29998->30005 30001->29913 30003 7ff6421a8a40 74 API calls 30002->30003 30004 7ff6421a8f73 30003->30004 30005->29919 30006->29922 30007->29923 30009 7ff642199214 GetErrorInfo 30008->30009 30010 7ff6421991ea GetProcAddress 30008->30010 30013 7ff64219928f 30009->30013 30016 7ff64219922e 30009->30016 30011 7ff642199202 30010->30011 30012 7ff64219920b FreeLibrary 30010->30012 30011->30009 30012->30009 30014 7ff642198ef0 50 API calls 30013->30014 30019 7ff642199269 30014->30019 30015 7ff6421992dc 30015->29997 30016->30019 30122 7ff642198ef0 GetErrorInfo 30016->30122 30018 7ff6421992d8 30018->30015 30021 7ff6421992fd GetProcessHeap HeapFree 30018->30021 30019->30015 30019->30018 30020 7ff642199313 30019->30020 30022 7ff6421a8a40 50 API calls 30020->30022 30021->30015 30023 7ff64219934d 30022->30023 30024 7ff6421994d4 30023->30024 30025 7ff6421994de 30023->30025 30026 7ff642199370 GetProcessHeap HeapAlloc 30023->30026 30024->29997 30029 7ff6421a8ee0 50 API calls 30025->30029 30027 7ff6421994e7 30026->30027 30030 7ff64219939a 30026->30030 30027->30025 30028 7ff642198ef0 50 API calls 30027->30028 30028->30025 30036 7ff642199523 30029->30036 30030->30024 30031 7ff642199661 30032 7ff642199685 FormatMessageW 30031->30032 30033 7ff642199860 30032->30033 30034 7ff6421996cb 30032->30034 30037 7ff64219986a GetProcessHeap HeapFree 30033->30037 30057 7ff64219965c 30033->30057 30034->30033 30041 7ff642199702 GetProcessHeap HeapAlloc 30034->30041 30035 7ff6421995f0 30039 7ff64219960e 30035->30039 30040 7ff642199608 SysFreeString 30035->30040 30036->30031 30036->30035 30038 7ff642198ef0 50 API calls 30036->30038 30037->30057 30038->30035 30042 7ff642199665 30039->30042 30043 7ff642199616 30039->30043 30040->30039 30048 7ff642199846 30041->30048 30049 7ff642199729 30041->30049 30046 7ff64219966f SysFreeString 30042->30046 30047 7ff642199675 30042->30047 30044 7ff642199624 SysStringLen 30043->30044 30045 7ff642199632 30043->30045 30044->30045 30051 7ff642199643 30045->30051 30052 7ff642199788 SysStringLen 30045->30052 30046->30047 30047->30032 30053 7ff64219967f SysFreeString 30047->30053 30050 7ff642198ef0 50 API calls 30048->30050 30049->30033 30050->30049 30051->30057 30058 7ff6421998b6 SysFreeString 30051->30058 30055 7ff642199799 30052->30055 30056 7ff642199898 30052->30056 30053->30032 30054 7ff6421999a3 30054->29997 30059 7ff64219989a SysFreeString 30055->30059 30063 7ff6421997d2 GetProcessHeap HeapAlloc 30055->30063 30056->30059 30057->30054 30060 7ff64219995f 30057->30060 30061 7ff6421999b1 30057->30061 30058->30057 30059->30051 30060->30054 30062 7ff642199969 GetProcessHeap HeapFree 30060->30062 30066 7ff6421a8a40 50 API calls 30061->30066 30062->30054 30064 7ff642199880 30063->30064 30065 7ff6421997f9 30063->30065 30067 7ff642198ef0 50 API calls 30064->30067 30065->30033 30065->30059 30068 7ff6421999eb 30066->30068 30069 7ff64219988a 30067->30069 30070 7ff642168b60 50 API calls 30068->30070 30069->30056 30071 7ff642199a52 30070->30071 30071->29997 30073 7ff642199360 30072->30073 30074 7ff6421994d4 30072->30074 30075 7ff6421994de 30073->30075 30076 7ff642199370 GetProcessHeap HeapAlloc 30073->30076 30074->29997 30079 7ff6421a8ee0 56 API calls 30075->30079 30077 7ff6421994e7 30076->30077 30080 7ff64219939a 30076->30080 30077->30075 30078 7ff642198ef0 56 API calls 30077->30078 30078->30075 30086 7ff642199523 30079->30086 30080->30074 30081 7ff642199661 30082 7ff642199685 FormatMessageW 30081->30082 30083 7ff642199860 30082->30083 30084 7ff6421996cb 30082->30084 30087 7ff64219986a GetProcessHeap HeapFree 30083->30087 30107 7ff64219965c 30083->30107 30084->30083 30091 7ff642199702 GetProcessHeap HeapAlloc 30084->30091 30085 7ff6421995f0 30089 7ff64219960e 30085->30089 30090 7ff642199608 SysFreeString 30085->30090 30086->30081 30086->30085 30088 7ff642198ef0 56 API calls 30086->30088 30087->30107 30088->30085 30092 7ff642199665 30089->30092 30093 7ff642199616 30089->30093 30090->30089 30098 7ff642199846 30091->30098 30099 7ff642199729 30091->30099 30096 7ff64219966f SysFreeString 30092->30096 30097 7ff642199675 30092->30097 30094 7ff642199624 SysStringLen 30093->30094 30095 7ff642199632 30093->30095 30094->30095 30101 7ff642199643 30095->30101 30102 7ff642199788 SysStringLen 30095->30102 30096->30097 30097->30082 30103 7ff64219967f SysFreeString 30097->30103 30100 7ff642198ef0 56 API calls 30098->30100 30099->30083 30100->30099 30101->30107 30108 7ff6421998b6 SysFreeString 30101->30108 30105 7ff642199799 30102->30105 30106 7ff642199898 30102->30106 30103->30082 30104 7ff6421999a3 30104->29997 30109 7ff64219989a SysFreeString 30105->30109 30113 7ff6421997d2 GetProcessHeap HeapAlloc 30105->30113 30106->30109 30107->30104 30110 7ff64219995f 30107->30110 30111 7ff6421999b1 30107->30111 30108->30107 30109->30101 30110->30104 30112 7ff642199969 GetProcessHeap HeapFree 30110->30112 30116 7ff6421a8a40 56 API calls 30111->30116 30112->30104 30114 7ff642199880 30113->30114 30115 7ff6421997f9 30113->30115 30117 7ff642198ef0 56 API calls 30114->30117 30115->30083 30115->30109 30118 7ff6421999eb 30116->30118 30119 7ff64219988a 30117->30119 30120 7ff642168b60 56 API calls 30118->30120 30119->30106 30121 7ff642199a52 30120->30121 30121->29997 30123 7ff642198fcb 30122->30123 30124 7ff642198f1d 30122->30124 30125 7ff642198ef0 68 API calls 30123->30125 30126 7ff642198fd2 30124->30126 30130 7ff642198f55 30124->30130 30131 7ff6421990fc 30124->30131 30125->30126 30127 7ff642198fed GetErrorInfo 30126->30127 30128 7ff6421990db 30127->30128 30129 7ff64219900b 30127->30129 30132 7ff642198ef0 68 API calls 30128->30132 30134 7ff642199038 30129->30134 30135 7ff64219912b 30129->30135 30148 7ff642198fb4 30129->30148 30130->30127 30136 7ff642198f67 30130->30136 30133 7ff642198ef0 68 API calls 30131->30133 30132->30148 30133->30126 30137 7ff642199132 30134->30137 30138 7ff642199046 SysStringLen 30134->30138 30139 7ff642198ef0 68 API calls 30135->30139 30144 7ff642199150 30136->30144 30151 7ff642198f91 30136->30151 30142 7ff6421991c0 68 API calls 30137->30142 30140 7ff642199057 GetProcessHeap HeapAlloc 30138->30140 30141 7ff64219918a 30138->30141 30139->30137 30143 7ff642199172 30140->30143 30149 7ff642199081 30140->30149 30146 7ff6421991c0 68 API calls 30141->30146 30142->30148 30145 7ff642198ef0 68 API calls 30143->30145 30147 7ff642198ef0 68 API calls 30144->30147 30145->30149 30150 7ff642199193 SysFreeString 30146->30150 30147->30148 30148->30019 30149->30141 30150->30148 30151->30148 30152 7ff642198ef0 68 API calls 30151->30152 30152->30148 33481 7ff642192880 30153->33481 30155 7ff642166481 30157 7ff6421a8970 74 API calls 30155->30157 30159 7ff6421664a8 30157->30159 33568 7ff6421a8fa0 74 API calls 30159->33568 30163 7ff6421664cd 30164 7ff642198ef0 74 API calls 30163->30164 30166 7ff6421664d4 30164->30166 30165 7ff642163e5d HeapFree 30230 7ff6421633d0 __FrameHandler3::FrameUnwindToEmptyState 30165->30230 33569 7ff642167380 30166->33569 30169 7ff642163f50 HeapFree 30169->30230 30170 7ff6421a8ee0 74 API calls 30171 7ff642166523 30170->30171 30172 7ff642198ef0 74 API calls 30171->30172 30173 7ff64216652a 30172->30173 30175 7ff642167380 76 API calls 30173->30175 30174 7ff642164d50 Sleep 30174->30230 30268 7ff642163b72 30174->30268 30176 7ff642166548 30175->30176 30178 7ff6421a8ee0 74 API calls 30176->30178 30177 7ff642164f99 HeapFree 30177->30230 30180 7ff642166579 30178->30180 30179 7ff642164fb5 HeapFree 30179->30230 30182 7ff6421a8ee0 74 API calls 30180->30182 30181 7ff6421651b0 HeapFree 30185 7ff642164feb HeapFree 30181->30185 30181->30230 30183 7ff6421665af 30182->30183 30187 7ff6421a8ee0 74 API calls 30183->30187 30184 7ff642164a70 Sleep 30184->30268 30185->30230 30186 7ff64216500f HeapFree 30186->30230 30188 7ff6421665da 30187->30188 30191 7ff6421a8970 74 API calls 30188->30191 30189 7ff64216491d AcquireSRWLockExclusive 30192 7ff642168b60 74 API calls 30189->30192 30194 7ff6421665e9 30191->30194 30192->30230 30193 7ff6421650c5 HeapFree 30193->30230 30196 7ff6421a8970 74 API calls 30194->30196 30195 7ff642165054 HeapFree 30195->30230 30199 7ff6421665f8 30196->30199 30197 7ff6421650a0 HeapFree 30202 7ff642165077 HeapFree 30197->30202 30197->30230 30198 7ff642164b5d HeapFree 30198->30268 30208 7ff6421a8ee0 74 API calls 30199->30208 30201 7ff642165161 CloseHandle 30206 7ff64216516b GetLastError 30201->30206 30201->30230 30202->30230 30203 7ff64216508e HeapFree 30203->30230 30204 7ff642164bd1 HeapFree 30204->30268 30205 7ff642165100 PdhRemoveCounter 30205->30230 30206->30230 30207 7ff6421651e0 PdhCloseQuery 30207->30230 30213 7ff642166646 30208->30213 30209 7ff642164ba0 HeapFree 30209->30268 30210 7ff642164c20 HeapFree 30214 7ff642164c42 HeapFree 30210->30214 30210->30268 30211 7ff64216644a 33567 7ff64216c090 74 API calls 30211->33567 30218 7ff6421a8ee0 74 API calls 30213->30218 30214->30268 30215 7ff6421a8a40 74 API calls 30223 7ff642166384 30215->30223 30216 7ff642166454 30220 7ff6421a8970 74 API calls 30216->30220 30217 7ff6421652ab HeapFree 30217->30230 30221 7ff642166692 30218->30221 30219 7ff642199350 74 API calls 30219->30230 30224 7ff642166463 30220->30224 30233 7ff6421a8ee0 74 API calls 30221->30233 30222 7ff642164cb1 HeapFree 30222->30268 30223->30215 30228 7ff6421a8970 74 API calls 30223->30228 30243 7ff64216643e 30223->30243 33565 7ff642167790 74 API calls 30223->33565 33566 7ff6421a8fa0 74 API calls 30223->33566 30232 7ff6421a8970 74 API calls 30224->30232 30225 7ff642165272 HeapFree 30225->30230 30226 7ff642164dde FilterConnectCommunicationPort 30226->30163 30226->30230 30227 7ff642164c80 HeapFree 30227->30268 30228->30223 30229 7ff642164cd6 HeapFree 30229->30268 30230->30155 30230->30159 30230->30165 30230->30169 30230->30174 30230->30177 30230->30179 30230->30181 30230->30184 30230->30185 30230->30186 30230->30188 30230->30189 30230->30193 30230->30194 30230->30195 30230->30197 30230->30201 30230->30202 30230->30203 30230->30205 30230->30207 30230->30211 30230->30216 30230->30217 30230->30219 30230->30223 30230->30224 30230->30225 30230->30226 30231 7ff64216346f GlobalMemoryStatusEx 30230->30231 30239 7ff64218f680 GetProcessHeap HeapAlloc 30230->30239 30245 7ff642163636 PdhCollectQueryData 30230->30245 30246 7ff6421637b0 PdhOpenQueryA 30230->30246 30255 7ff6421652c6 FilterSendMessage 30230->30255 30257 7ff642198c10 PdhGetFormattedCounterValue 30230->30257 30262 7ff642163703 30230->30262 30267 7ff642163b1d NtQuerySystemInformation 30230->30267 30230->30268 30270 7ff642192880 91 API calls 30230->30270 33555 7ff642192750 75 API calls 30230->33555 33556 7ff642198450 93 API calls 30230->33556 33559 7ff64216d990 84 API calls 30230->33559 33560 7ff642193210 177 API calls 30230->33560 30235 7ff642163598 GetLastError 30231->30235 30236 7ff64216359e K32GetPerformanceInfo 30231->30236 30237 7ff642166472 30232->30237 30238 7ff6421666ce 30233->30238 30234 7ff642164d10 HeapFree 30234->30268 30235->30236 30236->30230 30241 7ff6421a8970 74 API calls 30237->30241 30242 7ff6421a8a40 74 API calls 30238->30242 30239->30230 30241->30155 30247 7ff642166705 30242->30247 30248 7ff6421a8970 74 API calls 30243->30248 30245->30230 30246->30230 33544 7ff642161480 30247->33544 30248->30211 30252 7ff642161c00 427 API calls 30253 7ff642166716 30252->30253 33550 7ff64218f5a0 30253->33550 30255->30171 30261 7ff64216539a 30255->30261 30257->30230 30265 7ff64218f680 2 API calls 30261->30265 33564 7ff6421a8fa0 74 API calls 30262->33564 30276 7ff6421653ad 30265->30276 30267->30268 30268->30184 30268->30198 30268->30204 30268->30209 30268->30210 30268->30214 30268->30222 30268->30227 30268->30229 30268->30230 30268->30234 30268->30237 30268->30267 30274 7ff64218f680 2 API calls 30268->30274 33557 7ff6421aaed0 74 API calls 30268->33557 33558 7ff6421927c0 74 API calls 30268->33558 33561 7ff6421aafa0 80 API calls 30268->33561 33562 7ff642161760 CloseHandle GetLastError HeapFree 30268->33562 30270->30230 30274->30268 30276->30155 30281 7ff64216549f 30276->30281 33563 7ff64217f980 82 API calls 30281->33563 30293 7ff64216552c 30293->30180 30293->30183 30293->30262 30369 7ff642165ed0 30368->30369 30369->30368 30370 7ff642165efc HeapFree 30369->30370 30373 7ff642165f0a 30370->30373 30371 7ff642165f5b 30372 7ff642165f72 30371->30372 30375 7ff642165f68 CloseHandle 30371->30375 30376 7ff642165f7f CloseHandle 30372->30376 30381 7ff642165f89 30372->30381 30373->30371 30374 7ff642165f51 CloseHandle 30373->30374 30374->30371 30375->30372 30376->30381 30377 7ff6421662a4 30383 7ff642166335 HeapFree 30377->30383 30386 7ff642166326 HeapFree 30377->30386 30378 7ff64216625d HeapFree 30378->30377 30379 7ff6421661a2 30379->30378 30379->30379 30380 7ff642166240 HeapFree 30379->30380 30380->30378 30380->30380 30381->30377 30381->30379 30384 7ff64216609c HeapFree 30381->30384 30385 7ff642166353 30381->30385 30390 7ff642165fc0 HeapFree 30381->30390 30383->30385 30384->30381 33608 7ff642167760 HeapFree 30385->33608 30386->30383 30390->30381 30543 7ff642163a94 30541->30543 30542 7ff64218f680 2 API calls 30542->30543 30543->30542 30544 7ff642166463 30543->30544 30546 7ff642163b1d NtQuerySystemInformation 30543->30546 30597 7ff6421633d0 __FrameHandler3::FrameUnwindToEmptyState 30543->30597 30545 7ff6421a8970 74 API calls 30544->30545 30547 7ff642166472 30545->30547 30546->30597 30549 7ff6421a8970 74 API calls 30547->30549 30550 7ff642166481 30549->30550 30551 7ff6421a8970 74 API calls 30550->30551 30552 7ff6421664a8 30551->30552 33629 7ff6421a8fa0 74 API calls 30552->33629 30557 7ff6421664cd 30558 7ff642198ef0 74 API calls 30557->30558 30559 7ff6421664d4 30558->30559 30560 7ff642167380 76 API calls 30559->30560 30561 7ff6421664f2 30560->30561 30563 7ff6421a8ee0 74 API calls 30561->30563 30564 7ff642166523 30563->30564 30566 7ff642198ef0 74 API calls 30564->30566 30567 7ff64216652a 30566->30567 30568 7ff642167380 76 API calls 30567->30568 30569 7ff642166548 30568->30569 30570 7ff6421a8ee0 74 API calls 30569->30570 30572 7ff642166579 30570->30572 30571 7ff642163e5d HeapFree 30571->30597 30573 7ff6421a8ee0 74 API calls 30572->30573 30574 7ff6421665af 30573->30574 30575 7ff6421a8ee0 74 API calls 30574->30575 30577 7ff6421665da 30575->30577 30576 7ff642163f50 HeapFree 30576->30597 30578 7ff6421a8970 74 API calls 30577->30578 30579 7ff6421665e9 30578->30579 30580 7ff6421a8970 74 API calls 30579->30580 30581 7ff6421665f8 30580->30581 30583 7ff6421a8ee0 74 API calls 30581->30583 30582 7ff642164d50 Sleep 30582->30597 30585 7ff642166646 30583->30585 30584 7ff642164f99 HeapFree 30584->30597 30587 7ff6421a8ee0 74 API calls 30585->30587 30586 7ff642164fb5 HeapFree 30586->30597 30590 7ff642166692 30587->30590 30588 7ff6421651b0 HeapFree 30591 7ff642164feb HeapFree 30588->30591 30588->30597 30589 7ff642164a70 Sleep 30589->30597 30595 7ff6421a8ee0 74 API calls 30590->30595 30591->30597 30592 7ff64216500f HeapFree 30592->30597 30593 7ff64216491d AcquireSRWLockExclusive 30596 7ff642168b60 74 API calls 30593->30596 30599 7ff6421666ce 30595->30599 30596->30597 30597->30543 30597->30546 30597->30547 30597->30550 30597->30552 30597->30571 30597->30576 30597->30577 30597->30579 30597->30582 30597->30584 30597->30586 30597->30588 30597->30589 30597->30591 30597->30592 30597->30593 30598 7ff6421650c5 HeapFree 30597->30598 30600 7ff642165054 HeapFree 30597->30600 30603 7ff6421650a0 HeapFree 30597->30603 30604 7ff642164b5d HeapFree 30597->30604 30607 7ff642165161 CloseHandle 30597->30607 30608 7ff642165077 HeapFree 30597->30608 30609 7ff64216508e HeapFree 30597->30609 30610 7ff642164bd1 HeapFree 30597->30610 30612 7ff642165100 PdhRemoveCounter 30597->30612 30614 7ff6421651e0 PdhCloseQuery 30597->30614 30615 7ff642164ba0 HeapFree 30597->30615 30616 7ff642164c20 HeapFree 30597->30616 30618 7ff64216644a 30597->30618 30620 7ff642164c42 HeapFree 30597->30620 30623 7ff642166454 30597->30623 30624 7ff6421652ab HeapFree 30597->30624 30625 7ff642199350 74 API calls 30597->30625 30629 7ff642164cb1 HeapFree 30597->30629 30630 7ff642166384 30597->30630 30631 7ff642165272 HeapFree 30597->30631 30632 7ff642164dde FilterConnectCommunicationPort 30597->30632 30634 7ff642164c80 HeapFree 30597->30634 30636 7ff642164cd6 HeapFree 30597->30636 30637 7ff64216346f GlobalMemoryStatusEx 30597->30637 30639 7ff642164d10 HeapFree 30597->30639 30642 7ff64218f680 GetProcessHeap HeapAlloc 30597->30642 30648 7ff642163636 PdhCollectQueryData 30597->30648 30649 7ff6421637b0 PdhOpenQueryA 30597->30649 30658 7ff6421652c6 FilterSendMessage 30597->30658 30661 7ff642198c10 PdhGetFormattedCounterValue 30597->30661 30666 7ff642163703 30597->30666 30672 7ff642192880 91 API calls 30597->30672 33616 7ff642192750 75 API calls 30597->33616 33617 7ff642198450 93 API calls 30597->33617 33618 7ff6421aaed0 74 API calls 30597->33618 33619 7ff6421927c0 74 API calls 30597->33619 33620 7ff64216d990 84 API calls 30597->33620 33621 7ff642193210 177 API calls 30597->33621 33622 7ff6421aafa0 80 API calls 30597->33622 33623 7ff642161760 CloseHandle GetLastError HeapFree 30597->33623 30598->30597 30601 7ff6421a8a40 74 API calls 30599->30601 30600->30597 30602 7ff642166705 30601->30602 30605 7ff642161480 2 API calls 30602->30605 30603->30597 30603->30608 30604->30597 30611 7ff642166711 30605->30611 30607->30597 30613 7ff64216516b GetLastError 30607->30613 30608->30597 30609->30597 30610->30597 30617 7ff642161c00 427 API calls 30611->30617 30612->30597 30613->30597 30614->30597 30615->30597 30616->30597 30616->30620 30621 7ff642166716 30617->30621 33628 7ff64216c090 74 API calls 30618->33628 30620->30597 30626 7ff64218f5a0 81 API calls 30621->30626 30622 7ff6421a8a40 74 API calls 30622->30630 30627 7ff6421a8970 74 API calls 30623->30627 30624->30597 30625->30597 30628 7ff64216671b 30626->30628 30627->30544 33609 7ff642199d20 GetLastError 30628->33609 30629->30597 30630->30622 30635 7ff6421a8970 74 API calls 30630->30635 30646 7ff64216643e 30630->30646 33626 7ff642167790 74 API calls 30630->33626 33627 7ff6421a8fa0 74 API calls 30630->33627 30631->30597 30632->30557 30632->30597 30634->30597 30635->30630 30636->30597 30640 7ff642163598 GetLastError 30637->30640 30641 7ff64216359e K32GetPerformanceInfo 30637->30641 30638 7ff642166720 30643 7ff642167380 76 API calls 30638->30643 30639->30597 30640->30641 30641->30597 30642->30597 30645 7ff642166738 30643->30645 30650 7ff6421a8ee0 74 API calls 30645->30650 30651 7ff6421a8970 74 API calls 30646->30651 30648->30597 30649->30597 30653 7ff642166770 30650->30653 30651->30618 33610 7ff642199d20 GetLastError 30653->33610 30655 7ff642166775 30656 7ff642167380 76 API calls 30655->30656 30657 7ff64216678d 30656->30657 30659 7ff6421a8ee0 74 API calls 30657->30659 30658->30564 30665 7ff64216539a 30658->30665 30660 7ff6421667c5 30659->30660 33611 7ff642199d20 GetLastError 30660->33611 30661->30597 30664 7ff6421667ca 30668 7ff642167380 76 API calls 30664->30668 30669 7ff64218f680 2 API calls 30665->30669 30666->30572 30666->30574 33625 7ff6421a8fa0 74 API calls 30666->33625 30670 7ff6421667e2 30668->30670 30679 7ff6421653ad 30669->30679 30673 7ff6421a8ee0 74 API calls 30670->30673 30672->30597 30674 7ff64216681a 30673->30674 33612 7ff642199d20 GetLastError 30674->33612 30676 7ff64216681f 30677 7ff642167380 76 API calls 30676->30677 30678 7ff642166837 30677->30678 30680 7ff6421a8ee0 74 API calls 30678->30680 30679->30550 33624 7ff64217f980 82 API calls 30679->33624 30754 7ff642161c38 FilterConnectCommunicationPort 30753->30754 30755 7ff642161dda 30754->30755 30756 7ff642161c61 30754->30756 30758 7ff642198ef0 74 API calls 30755->30758 30757 7ff642167380 76 API calls 30756->30757 30760 7ff642161c7d 30757->30760 30759 7ff642161de1 30758->30759 30761 7ff642167380 76 API calls 30759->30761 30762 7ff642161c85 HeapFree 30760->30762 30770 7ff642161c99 30760->30770 30763 7ff642161dfd 30761->30763 30762->30770 30765 7ff642161e2d 30763->30765 30766 7ff6421a8ee0 74 API calls 30763->30766 30764 7ff642161cd8 GetCurrentProcessId FilterSendMessage 30764->30765 30767 7ff642161d37 30764->30767 30769 7ff642198ef0 74 API calls 30765->30769 30766->30765 30768 7ff642167380 76 API calls 30767->30768 30771 7ff642161d4e 30768->30771 30773 7ff642161e34 30769->30773 30770->30764 30772 7ff642161dc1 GetProcessHeap HeapFree 30770->30772 30774 7ff642161ed2 30770->30774 30775 7ff642161d6a CloseHandle 30771->30775 30776 7ff642161d56 HeapFree 30771->30776 30772->30764 30778 7ff642167380 76 API calls 30773->30778 30777 7ff6421a8a40 74 API calls 30774->30777 30779 7ff642161d7b 30775->30779 30780 7ff642161e80 30775->30780 30776->30775 30781 7ff642161f0c 30777->30781 30782 7ff642161e50 30778->30782 30785 7ff642167380 76 API calls 30779->30785 33678 7ff642199d20 GetLastError 30780->33678 30788 7ff642161f26 GetCommandLineW 30781->30788 30783 7ff6421a8ee0 74 API calls 30782->30783 30783->30780 30787 7ff642161d92 30785->30787 30786 7ff642161e85 30789 7ff642167380 76 API calls 30786->30789 30790 7ff642161d9a HeapFree 30787->30790 30791 7ff642161dae 30787->30791 30792 7ff642161f83 30788->30792 30793 7ff642162414 30788->30793 30794 7ff642161e9e 30789->30794 30790->30791 30791->29926 30792->30793 30799 7ff642161f92 30792->30799 33684 7ff64217f980 82 API calls 30793->33684 30796 7ff6421a8ee0 74 API calls 30794->30796 30796->30774 30797 7ff64216241d 30798 7ff642162441 30797->30798 33685 7ff642177de0 HeapFree HeapFree 30797->33685 33686 7ff64216fd10 74 API calls 30798->33686 30802 7ff642161fca 30799->30802 33679 7ff64217a480 74 API calls 30799->33679 33680 7ff64217c190 75 API calls 30802->33680 30803 7ff6421624d1 30814 7ff6421625c8 30803->30814 30806 7ff642162064 33681 7ff64216fd10 74 API calls 30806->33681 30808 7ff642166705 30809 7ff642161480 2 API calls 30808->30809 30811 7ff642166711 30809->30811 30810 7ff642162630 30812 7ff64216263c HeapFree 30810->30812 30813 7ff642162652 GetCurrentProcess OpenProcessToken 30810->30813 30816 7ff642161c00 427 API calls 30811->30816 30812->30813 30818 7ff64216671b 30813->30818 30819 7ff642162680 30813->30819 30814->30808 30814->30810 30815 7ff642162620 HeapFree 30814->30815 30815->30814 30820 7ff642166716 30816->30820 30817 7ff6421622c0 30844 7ff64216246f 30817->30844 33687 7ff64217c190 75 API calls 30817->33687 33705 7ff642199d20 GetLastError 30818->33705 30822 7ff642167380 76 API calls 30819->30822 30824 7ff64218f5a0 81 API calls 30820->30824 30826 7ff642162696 30822->30826 30824->30818 30825 7ff642166720 30828 7ff642167380 76 API calls 30825->30828 30829 7ff64216269d HeapFree 30826->30829 30830 7ff6421626b0 LookupPrivilegeValueW 30826->30830 30827 7ff642162539 30827->30844 33688 7ff64216fd10 74 API calls 30827->33688 30834 7ff642166738 30828->30834 30829->30830 30835 7ff6421626d9 30830->30835 30836 7ff642166770 30830->30836 30831 7ff642162592 HeapFree 30832 7ff642162492 30831->30832 30832->30814 30841 7ff6421625b2 HeapFree 30832->30841 30840 7ff6421a8ee0 74 API calls 30834->30840 30837 7ff642167380 76 API calls 30835->30837 33706 7ff642199d20 GetLastError 30836->33706 30843 7ff6421626ef 30837->30843 30839 7ff642162079 30839->30817 30839->30839 30846 7ff6421aae10 74 API calls 30839->30846 30859 7ff64217a480 74 API calls 30839->30859 33682 7ff64217c190 75 API calls 30839->33682 33683 7ff64216fd10 74 API calls 30839->33683 30840->30836 30841->30814 30848 7ff6421626f6 HeapFree 30843->30848 30849 7ff642162709 AdjustTokenPrivileges 30843->30849 30844->30831 30844->30832 30845 7ff642166775 30850 7ff642167380 76 API calls 30845->30850 30846->30839 30848->30849 30852 7ff64216275a 30849->30852 30853 7ff6421667c5 30849->30853 30851 7ff64216678d 30850->30851 30854 7ff6421a8ee0 74 API calls 30851->30854 30856 7ff642167380 76 API calls 30852->30856 33707 7ff642199d20 GetLastError 30853->33707 30854->30853 30858 7ff642162770 30856->30858 30857 7ff6421667ca 30860 7ff642167380 76 API calls 30857->30860 30861 7ff64216278a CloseHandle 30858->30861 30862 7ff642162777 HeapFree 30858->30862 30859->30839 30863 7ff6421667e2 30860->30863 30864 7ff64216681a 30861->30864 30865 7ff64216279f 30861->30865 30862->30861 30866 7ff6421a8ee0 74 API calls 30863->30866 33708 7ff642199d20 GetLastError 30864->33708 30868 7ff642167380 76 API calls 30865->30868 30866->30864 30870 7ff6421627b5 30868->30870 30869 7ff64216681f 30871 7ff642167380 76 API calls 30869->30871 30872 7ff6421627bc HeapFree 30870->30872 30873 7ff6421627cf 30870->30873 30874 7ff642166837 30871->30874 30872->30873 30875 7ff64218f680 2 API calls 30873->30875 30876 7ff6421a8ee0 74 API calls 30874->30876 30877 7ff6421627e2 30875->30877 30878 7ff64216686f 30876->30878 30877->30878 30880 7ff642167380 76 API calls 30877->30880 30879 7ff6421a8970 74 API calls 30878->30879 30881 7ff64216687e 30879->30881 30882 7ff64216282a 30880->30882 33709 7ff642199d20 GetLastError 30881->33709 30891 7ff642162863 30882->30891 33689 7ff6421a9100 74 API calls 30882->33689 30884 7ff642166883 30886 7ff642167380 76 API calls 30884->30886 33631 7ff642182f30 30891->33631 31239 7ff642199350 74 API calls 31238->31239 31240 7ff642161c1a FilterConnectCommunicationPort 31239->31240 31242 7ff642161dda 31240->31242 31243 7ff642161c61 31240->31243 31245 7ff642198ef0 74 API calls 31242->31245 31244 7ff642167380 76 API calls 31243->31244 31247 7ff642161c7d 31244->31247 31246 7ff642161de1 31245->31246 31248 7ff642167380 76 API calls 31246->31248 31249 7ff642161c85 HeapFree 31247->31249 31257 7ff642161c99 31247->31257 31250 7ff642161dfd 31248->31250 31249->31257 31252 7ff642161e2d 31250->31252 31253 7ff6421a8ee0 74 API calls 31250->31253 31251 7ff642161cd8 GetCurrentProcessId FilterSendMessage 31251->31252 31254 7ff642161d37 31251->31254 31256 7ff642198ef0 74 API calls 31252->31256 31253->31252 31255 7ff642167380 76 API calls 31254->31255 31258 7ff642161d4e 31255->31258 31260 7ff642161e34 31256->31260 31257->31251 31259 7ff642161dc1 GetProcessHeap HeapFree 31257->31259 31261 7ff642161ed2 31257->31261 31262 7ff642161d6a CloseHandle 31258->31262 31263 7ff642161d56 HeapFree 31258->31263 31259->31251 31265 7ff642167380 76 API calls 31260->31265 31264 7ff6421a8a40 74 API calls 31261->31264 31266 7ff642161d7b 31262->31266 31267 7ff642161e80 31262->31267 31263->31262 31268 7ff642161f0c 31264->31268 31269 7ff642161e50 31265->31269 31272 7ff642167380 76 API calls 31266->31272 33823 7ff642199d20 GetLastError 31267->33823 31275 7ff642161f26 GetCommandLineW 31268->31275 31270 7ff6421a8ee0 74 API calls 31269->31270 31270->31267 31274 7ff642161d92 31272->31274 31273 7ff642161e85 31276 7ff642167380 76 API calls 31273->31276 31277 7ff642161d9a HeapFree 31274->31277 31278 7ff642161dae 31274->31278 31279 7ff642161f83 31275->31279 31280 7ff642162414 31275->31280 31281 7ff642161e9e 31276->31281 31277->31278 31278->29926 31279->31280 31286 7ff642161f92 31279->31286 33829 7ff64217f980 82 API calls 31280->33829 31283 7ff6421a8ee0 74 API calls 31281->31283 31283->31261 31284 7ff64216241d 31285 7ff642162441 31284->31285 33830 7ff642177de0 HeapFree HeapFree 31284->33830 33831 7ff64216fd10 74 API calls 31285->33831 31289 7ff642161fca 31286->31289 33824 7ff64217a480 74 API calls 31286->33824 33825 7ff64217c190 75 API calls 31289->33825 31290 7ff6421624d1 31301 7ff6421625c8 31290->31301 31293 7ff642162064 33826 7ff64216fd10 74 API calls 31293->33826 31295 7ff642166705 31296 7ff642161480 2 API calls 31295->31296 31298 7ff642166711 31296->31298 31297 7ff642162630 31299 7ff64216263c HeapFree 31297->31299 31300 7ff642162652 GetCurrentProcess OpenProcessToken 31297->31300 31303 7ff642161c00 340 API calls 31298->31303 31299->31300 31305 7ff64216671b 31300->31305 31306 7ff642162680 31300->31306 31301->31295 31301->31297 31302 7ff642162620 HeapFree 31301->31302 31302->31301 31307 7ff642166716 31303->31307 31304 7ff6421622c0 31331 7ff64216246f 31304->31331 33832 7ff64217c190 75 API calls 31304->33832 33850 7ff642199d20 GetLastError 31305->33850 31309 7ff642167380 76 API calls 31306->31309 31311 7ff64218f5a0 81 API calls 31307->31311 31313 7ff642162696 31309->31313 31311->31305 31312 7ff642166720 31315 7ff642167380 76 API calls 31312->31315 31316 7ff64216269d HeapFree 31313->31316 31317 7ff6421626b0 LookupPrivilegeValueW 31313->31317 31314 7ff642162539 31314->31331 33833 7ff64216fd10 74 API calls 31314->33833 31321 7ff642166738 31315->31321 31316->31317 31322 7ff6421626d9 31317->31322 31323 7ff642166770 31317->31323 31318 7ff642162592 HeapFree 31319 7ff642162492 31318->31319 31319->31301 31328 7ff6421625b2 HeapFree 31319->31328 31327 7ff6421a8ee0 74 API calls 31321->31327 31324 7ff642167380 76 API calls 31322->31324 33851 7ff642199d20 GetLastError 31323->33851 31330 7ff6421626ef 31324->31330 31326 7ff642162079 31326->31304 31326->31326 31336 7ff6421aae10 74 API calls 31326->31336 31346 7ff64217a480 74 API calls 31326->31346 33827 7ff64217c190 75 API calls 31326->33827 33828 7ff64216fd10 74 API calls 31326->33828 31327->31323 31328->31301 31334 7ff6421626f6 HeapFree 31330->31334 31335 7ff642162709 AdjustTokenPrivileges 31330->31335 31331->31318 31331->31319 31332 7ff642166775 31337 7ff642167380 76 API calls 31332->31337 31334->31335 31339 7ff64216275a 31335->31339 31340 7ff6421667c5 31335->31340 31336->31326 31338 7ff64216678d 31337->31338 31341 7ff6421a8ee0 74 API calls 31338->31341 31343 7ff642167380 76 API calls 31339->31343 33852 7ff642199d20 GetLastError 31340->33852 31341->31340 31345 7ff642162770 31343->31345 31344 7ff6421667ca 31347 7ff642167380 76 API calls 31344->31347 31348 7ff64216278a CloseHandle 31345->31348 31349 7ff642162777 HeapFree 31345->31349 31346->31326 31350 7ff6421667e2 31347->31350 31351 7ff64216681a 31348->31351 31352 7ff64216279f 31348->31352 31349->31348 31353 7ff6421a8ee0 74 API calls 31350->31353 33853 7ff642199d20 GetLastError 31351->33853 31355 7ff642167380 76 API calls 31352->31355 31353->31351 31357 7ff6421627b5 31355->31357 31356 7ff64216681f 31358 7ff642167380 76 API calls 31356->31358 31359 7ff6421627bc HeapFree 31357->31359 31360 7ff6421627cf 31357->31360 31361 7ff642166837 31358->31361 31359->31360 31362 7ff64218f680 2 API calls 31360->31362 31363 7ff6421a8ee0 74 API calls 31361->31363 31364 7ff6421627e2 31362->31364 31365 7ff64216686f 31363->31365 31364->31365 31367 7ff642167380 76 API calls 31364->31367 31366 7ff6421a8970 74 API calls 31365->31366 31368 7ff64216687e 31366->31368 31369 7ff64216282a 31367->31369 33854 7ff642199d20 GetLastError 31368->33854 31378 7ff642162863 31369->31378 33834 7ff6421a9100 74 API calls 31369->33834 31380 7ff642182f30 100 API calls 31378->31380 31382 7ff642162969 31380->31382 31726 7ff642163f90 31725->31726 31763 7ff6421633d0 __FrameHandler3::FrameUnwindToEmptyState 31726->31763 33859 7ff642193f60 31726->33859 31728 7ff642163f50 HeapFree 31728->31763 31729 7ff642164d50 Sleep 31761 7ff642163b72 31729->31761 31729->31763 31730 7ff642164f99 HeapFree 31730->31763 31731 7ff642164fb5 HeapFree 31731->31763 31732 7ff6421651b0 HeapFree 31734 7ff642164feb HeapFree 31732->31734 31732->31763 31733 7ff642164a70 Sleep 31733->31761 31734->31763 31735 7ff64216500f HeapFree 31735->31763 31736 7ff64216491d AcquireSRWLockExclusive 31738 7ff642168b60 74 API calls 31736->31738 31738->31763 31739 7ff6421650c5 HeapFree 31739->31763 31740 7ff642165054 HeapFree 31740->31763 31741 7ff6421650a0 HeapFree 31745 7ff642165077 HeapFree 31741->31745 31741->31763 31742 7ff642164b5d HeapFree 31742->31761 31744 7ff642165161 CloseHandle 31747 7ff64216516b GetLastError 31744->31747 31744->31763 31745->31763 31746 7ff642165100 PdhRemoveCounter 31746->31763 31747->31763 31748 7ff64216508e HeapFree 31748->31763 31749 7ff6421651e0 PdhCloseQuery 31749->31763 31750 7ff642164bd1 HeapFree 31750->31761 31751 7ff642164c20 HeapFree 31754 7ff642164c42 HeapFree 31751->31754 31751->31761 31752 7ff64216644a 33897 7ff64216c090 74 API calls 31752->33897 31753 7ff642164ba0 HeapFree 31753->31761 31754->31761 31756 7ff6421a8a40 74 API calls 31772 7ff642166384 31756->31772 31757 7ff642166454 31760 7ff6421a8970 74 API calls 31757->31760 31758 7ff6421652ab HeapFree 31758->31763 31759 7ff642199350 74 API calls 31759->31763 31764 7ff642166463 31760->31764 31761->31733 31761->31742 31761->31750 31761->31751 31761->31753 31761->31754 31762 7ff642164cb1 HeapFree 31761->31762 31761->31763 31766 7ff642164c80 HeapFree 31761->31766 31768 7ff642164cd6 HeapFree 31761->31768 31774 7ff642164d10 HeapFree 31761->31774 31778 7ff642166472 31761->31778 31783 7ff642166481 31761->31783 31819 7ff642163b1d NtQuerySystemInformation 31761->31819 31826 7ff64218f680 2 API calls 31761->31826 31852 7ff642163e5d HeapFree 31761->31852 33887 7ff6421aaed0 74 API calls 31761->33887 33888 7ff6421927c0 74 API calls 31761->33888 33889 7ff64216d990 84 API calls 31761->33889 33890 7ff642193210 177 API calls 31761->33890 33891 7ff6421aafa0 80 API calls 31761->33891 33892 7ff642161760 CloseHandle GetLastError HeapFree 31761->33892 31762->31761 31763->31728 31763->31729 31763->31730 31763->31731 31763->31732 31763->31733 31763->31734 31763->31735 31763->31736 31763->31739 31763->31740 31763->31741 31763->31744 31763->31745 31763->31746 31763->31748 31763->31749 31763->31752 31763->31757 31763->31758 31763->31759 31763->31761 31763->31764 31765 7ff642165272 HeapFree 31763->31765 31769 7ff642164dde FilterConnectCommunicationPort 31763->31769 31770 7ff64216346f GlobalMemoryStatusEx 31763->31770 31763->31772 31763->31783 31785 7ff642163636 PdhCollectQueryData 31763->31785 31786 7ff6421637b0 PdhOpenQueryA 31763->31786 31793 7ff6421664a8 31763->31793 31799 7ff6421665da 31763->31799 31800 7ff6421652c6 FilterSendMessage 31763->31800 31802 7ff64218f680 GetProcessHeap HeapAlloc 31763->31802 31805 7ff642198c10 PdhGetFormattedCounterValue 31763->31805 31806 7ff6421665e9 31763->31806 31811 7ff642163703 31763->31811 31763->31819 31821 7ff642192880 91 API calls 31763->31821 33885 7ff642192750 75 API calls 31763->33885 33886 7ff642198450 93 API calls 31763->33886 31771 7ff6421a8970 74 API calls 31764->31771 31765->31763 31766->31761 31767 7ff6421a8970 74 API calls 31767->31772 31768->31761 31769->31763 31773 7ff6421664cd 31769->31773 31775 7ff642163598 GetLastError 31770->31775 31776 7ff64216359e K32GetPerformanceInfo 31770->31776 31771->31778 31772->31756 31772->31767 31782 7ff64216643e 31772->31782 33895 7ff642167790 74 API calls 31772->33895 33896 7ff6421a8fa0 74 API calls 31772->33896 31777 7ff642198ef0 74 API calls 31773->31777 31774->31761 31775->31776 31776->31763 31780 7ff6421664d4 31777->31780 31781 7ff6421a8970 74 API calls 31778->31781 31787 7ff642167380 76 API calls 31780->31787 31781->31783 31788 7ff6421a8970 74 API calls 31782->31788 31791 7ff6421a8970 74 API calls 31783->31791 31785->31763 31786->31763 31789 7ff6421664f2 31787->31789 31788->31752 31792 7ff6421a8ee0 74 API calls 31789->31792 31791->31793 31794 7ff642166523 31792->31794 33898 7ff6421a8fa0 74 API calls 31793->33898 31797 7ff642198ef0 74 API calls 31794->31797 31801 7ff64216652a 31797->31801 31803 7ff6421a8970 74 API calls 31799->31803 31800->31794 31815 7ff64216539a 31800->31815 31804 7ff642167380 76 API calls 31801->31804 31802->31763 31803->31806 31807 7ff642166548 31804->31807 31805->31763 31808 7ff6421a8970 74 API calls 31806->31808 31809 7ff6421a8ee0 74 API calls 31807->31809 31813 7ff6421665f8 31808->31813 31814 7ff642166579 31809->31814 33894 7ff6421a8fa0 74 API calls 31811->33894 31822 7ff6421a8ee0 74 API calls 31813->31822 31817 7ff6421a8ee0 74 API calls 31814->31817 31816 7ff64218f680 2 API calls 31815->31816 31828 7ff6421653ad 31816->31828 31818 7ff6421665af 31817->31818 31823 7ff6421a8ee0 74 API calls 31818->31823 31819->31761 31821->31763 31825 7ff642166646 31822->31825 31823->31799 31827 7ff6421a8ee0 74 API calls 31825->31827 31826->31761 31829 7ff642166692 31827->31829 31828->31783 31831 7ff64216549f 31828->31831 31830 7ff6421a8ee0 74 API calls 31829->31830 31832 7ff6421666ce 31830->31832 33893 7ff64217f980 82 API calls 31831->33893 31834 7ff6421a8a40 74 API calls 31832->31834 31835 7ff642166705 31834->31835 31836 7ff642161480 2 API calls 31835->31836 31838 7ff642166711 31836->31838 31839 7ff642161c00 427 API calls 31838->31839 31840 7ff642166716 31839->31840 31841 7ff64218f5a0 81 API calls 31840->31841 31842 7ff64216671b 31841->31842 33878 7ff642199d20 GetLastError 31842->33878 31845 7ff642166720 31847 7ff642167380 76 API calls 31845->31847 31848 7ff642166738 31847->31848 31849 7ff6421a8ee0 74 API calls 31848->31849 31850 7ff642166770 31849->31850 33879 7ff642199d20 GetLastError 31850->33879 31852->31761 31853 7ff642166775 31854 7ff642167380 76 API calls 31853->31854 31855 7ff64216678d 31854->31855 31856 7ff6421a8ee0 74 API calls 31855->31856 31857 7ff6421667c5 31856->31857 33880 7ff642199d20 GetLastError 31857->33880 31859 7ff64216552c 31859->31811 31859->31814 31859->31818 31860 7ff6421667ca 31861 7ff642167380 76 API calls 31860->31861 31862 7ff6421667e2 31861->31862 31863 7ff6421a8ee0 74 API calls 31862->31863 31864 7ff64216681a 31863->31864 33881 7ff642199d20 GetLastError 31864->33881 31866 7ff64216681f 31867 7ff642167380 76 API calls 31866->31867 31868 7ff642166837 31867->31868 31869 7ff6421a8ee0 74 API calls 31868->31869 33903 7ff6421927c0 74 API calls 31941->33903 31943 7ff642166481 31945 7ff6421a8970 74 API calls 31943->31945 31947 7ff6421664a8 31945->31947 33913 7ff6421a8fa0 74 API calls 31947->33913 31951 7ff6421664cd 31952 7ff642198ef0 74 API calls 31951->31952 31954 7ff6421664d4 31952->31954 31953 7ff642163e5d HeapFree 32041 7ff6421633d0 __FrameHandler3::FrameUnwindToEmptyState 31953->32041 31955 7ff642167380 76 API calls 31954->31955 31956 7ff6421664f2 31955->31956 31958 7ff6421a8ee0 74 API calls 31956->31958 31957 7ff642163f50 HeapFree 31957->32041 31959 7ff642166523 31958->31959 31960 7ff642198ef0 74 API calls 31959->31960 31961 7ff64216652a 31960->31961 31963 7ff642167380 76 API calls 31961->31963 31962 7ff642164d50 Sleep 31962->32041 31964 7ff642166548 31963->31964 31966 7ff6421a8ee0 74 API calls 31964->31966 31965 7ff642164f99 HeapFree 31965->32041 31968 7ff642166579 31966->31968 31967 7ff642164fb5 HeapFree 31967->32041 31970 7ff6421a8ee0 74 API calls 31968->31970 31969 7ff6421651b0 HeapFree 31973 7ff642164feb HeapFree 31969->31973 31969->32041 31971 7ff6421665af 31970->31971 31975 7ff6421a8ee0 74 API calls 31971->31975 31972 7ff642164a70 Sleep 31972->32041 31973->32041 31974 7ff64216500f HeapFree 31974->32041 31977 7ff6421665da 31975->31977 31976 7ff642163b72 31976->31972 32056 7ff642163b1d NtQuerySystemInformation 31976->32056 33902 7ff6421aaed0 74 API calls 31976->33902 33906 7ff6421aafa0 80 API calls 31976->33906 33907 7ff642161760 CloseHandle GetLastError HeapFree 31976->33907 31980 7ff6421a8970 74 API calls 31977->31980 31978 7ff64216491d AcquireSRWLockExclusive 31981 7ff642168b60 74 API calls 31978->31981 31983 7ff6421665e9 31980->31983 31981->32041 31982 7ff6421650c5 HeapFree 31982->32041 31985 7ff6421a8970 74 API calls 31983->31985 31984 7ff642165054 HeapFree 31984->32041 31988 7ff6421665f8 31985->31988 31986 7ff6421650a0 HeapFree 31991 7ff642165077 HeapFree 31986->31991 31986->32041 31987 7ff642164b5d HeapFree 31987->32041 31997 7ff6421a8ee0 74 API calls 31988->31997 31990 7ff642165161 CloseHandle 31995 7ff64216516b GetLastError 31990->31995 31990->32041 31991->32041 31992 7ff64216508e HeapFree 31992->32041 31993 7ff642164bd1 HeapFree 31993->32041 31994 7ff642165100 PdhRemoveCounter 31994->32041 31995->32041 31996 7ff6421651e0 PdhCloseQuery 31996->32041 32002 7ff642166646 31997->32002 31998 7ff642164ba0 HeapFree 31998->32041 31999 7ff642164c20 HeapFree 32003 7ff642164c42 HeapFree 31999->32003 31999->32041 32000 7ff64216644a 33912 7ff64216c090 74 API calls 32000->33912 32007 7ff6421a8ee0 74 API calls 32002->32007 32003->32041 32004 7ff6421a8a40 74 API calls 32021 7ff642166384 32004->32021 32005 7ff642166454 32009 7ff6421a8970 74 API calls 32005->32009 32006 7ff6421652ab HeapFree 32006->32041 32010 7ff642166692 32007->32010 32008 7ff642199350 74 API calls 32008->32041 32012 7ff642166463 32009->32012 32020 7ff6421a8ee0 74 API calls 32010->32020 32011 7ff642164cb1 HeapFree 32011->32041 32019 7ff6421a8970 74 API calls 32012->32019 32013 7ff642165272 HeapFree 32013->32041 32014 7ff642164dde FilterConnectCommunicationPort 32014->31951 32014->32041 32015 7ff642164c80 HeapFree 32015->32041 32016 7ff6421a8970 74 API calls 32016->32021 32017 7ff642164cd6 HeapFree 32017->32041 32018 7ff64216346f GlobalMemoryStatusEx 32023 7ff642163598 GetLastError 32018->32023 32024 7ff64216359e K32GetPerformanceInfo 32018->32024 32025 7ff642166472 32019->32025 32026 7ff6421666ce 32020->32026 32021->32004 32021->32016 32031 7ff64216643e 32021->32031 33910 7ff642167790 74 API calls 32021->33910 33911 7ff6421a8fa0 74 API calls 32021->33911 32022 7ff642164d10 HeapFree 32022->32041 32023->32024 32024->32041 32029 7ff6421a8970 74 API calls 32025->32029 32030 7ff6421a8a40 74 API calls 32026->32030 32027 7ff64218f680 GetProcessHeap HeapAlloc 32027->32041 32029->31943 32035 7ff642166705 32030->32035 32036 7ff6421a8970 74 API calls 32031->32036 32033 7ff642163636 PdhCollectQueryData 32033->32041 32034 7ff6421637b0 PdhOpenQueryA 32034->32041 32037 7ff642161480 2 API calls 32035->32037 32036->32000 32039 7ff642166711 32037->32039 32040 7ff642161c00 427 API calls 32039->32040 32042 7ff642166716 32040->32042 32041->31941 32041->31943 32041->31947 32041->31953 32041->31957 32041->31962 32041->31965 32041->31967 32041->31969 32041->31972 32041->31973 32041->31974 32041->31976 32041->31977 32041->31978 32041->31982 32041->31983 32041->31984 32041->31986 32041->31987 32041->31990 32041->31991 32041->31992 32041->31993 32041->31994 32041->31996 32041->31998 32041->31999 32041->32000 32041->32003 32041->32005 32041->32006 32041->32008 32041->32011 32041->32012 32041->32013 32041->32014 32041->32015 32041->32017 32041->32018 32041->32021 32041->32022 32041->32025 32041->32027 32041->32033 32041->32034 32044 7ff6421652c6 FilterSendMessage 32041->32044 32046 7ff642198c10 PdhGetFormattedCounterValue 32041->32046 32051 7ff642163703 32041->32051 32041->32056 32058 7ff642192880 91 API calls 32041->32058 33900 7ff642192750 75 API calls 32041->33900 33901 7ff642198450 93 API calls 32041->33901 33904 7ff64216d990 84 API calls 32041->33904 33905 7ff642193210 177 API calls 32041->33905 32043 7ff64218f5a0 81 API calls 32042->32043 32045 7ff64216671b 32043->32045 32044->31959 32050 7ff64216539a 32044->32050 33914 7ff642199d20 GetLastError 32045->33914 32046->32041 32049 7ff642166720 32053 7ff642167380 76 API calls 32049->32053 32054 7ff64218f680 2 API calls 32050->32054 32051->31968 32051->31971 33909 7ff6421a8fa0 74 API calls 32051->33909 32055 7ff642166738 32053->32055 32063 7ff6421653ad 32054->32063 32059 7ff6421a8ee0 74 API calls 32055->32059 32056->31976 32056->32041 32058->32041 32061 7ff642166770 32059->32061 33915 7ff642199d20 GetLastError 32061->33915 32063->31943 32068 7ff64216549f 32063->32068 32064 7ff642166775 32065 7ff642167380 76 API calls 32064->32065 32066 7ff64216678d 32065->32066 32067 7ff6421a8ee0 74 API calls 32066->32067 32069 7ff6421667c5 32067->32069 33908 7ff64217f980 82 API calls 32068->33908 33916 7ff642199d20 GetLastError 32069->33916 32071 7ff6421667ca 32073 7ff642167380 76 API calls 32071->32073 32074 7ff6421667e2 32073->32074 32075 7ff6421a8ee0 74 API calls 32074->32075 32076 7ff64216681a 32075->32076 33917 7ff642199d20 GetLastError 32076->33917 32078 7ff64216681f 32079 7ff642167380 76 API calls 32078->32079 32080 7ff642166837 32079->32080 32081 7ff6421a8ee0 74 API calls 32080->32081 32154 7ff642164f5d FilterSendMessage 32153->32154 32155 7ff6421665f8 32153->32155 32160 7ff64216539a 32154->32160 32161 7ff642166523 32154->32161 32156 7ff6421a8ee0 74 API calls 32155->32156 32157 7ff642166646 32156->32157 32159 7ff6421a8ee0 74 API calls 32157->32159 32164 7ff642166692 32159->32164 32162 7ff64218f680 2 API calls 32160->32162 32163 7ff642198ef0 74 API calls 32161->32163 32172 7ff6421653ad 32162->32172 32165 7ff64216652a 32163->32165 32168 7ff6421a8ee0 74 API calls 32164->32168 32167 7ff642167380 76 API calls 32165->32167 32166 7ff642166499 32170 7ff6421a8970 74 API calls 32166->32170 32169 7ff642166548 32167->32169 32171 7ff6421666ce 32168->32171 32173 7ff6421a8ee0 74 API calls 32169->32173 32174 7ff6421664a8 32170->32174 32175 7ff6421a8a40 74 API calls 32171->32175 32172->32166 32185 7ff64216549f 32172->32185 32177 7ff642166579 32173->32177 33931 7ff6421a8fa0 74 API calls 32174->33931 32176 7ff642166705 32175->32176 32180 7ff642161480 2 API calls 32176->32180 32181 7ff6421a8ee0 74 API calls 32177->32181 32184 7ff642166711 32180->32184 32182 7ff6421665af 32181->32182 32186 7ff6421a8ee0 74 API calls 32182->32186 32188 7ff642161c00 427 API calls 32184->32188 33929 7ff64217f980 82 API calls 32185->33929 32189 7ff6421665da 32186->32189 32191 7ff642166716 32188->32191 32192 7ff6421a8970 74 API calls 32189->32192 32194 7ff64218f5a0 81 API calls 32191->32194 32196 7ff6421665e9 32192->32196 32198 7ff64216671b 32194->32198 32199 7ff6421a8970 74 API calls 32196->32199 33922 7ff642199d20 GetLastError 32198->33922 32199->32155 32203 7ff642166720 32204 7ff642167380 76 API calls 32203->32204 32205 7ff642166738 32204->32205 32206 7ff6421a8ee0 74 API calls 32205->32206 32207 7ff642166770 32206->32207 33923 7ff642199d20 GetLastError 32207->33923 32209 7ff642166775 32210 7ff642167380 76 API calls 32209->32210 32211 7ff64216678d 32210->32211 32212 7ff6421a8ee0 74 API calls 32211->32212 32213 7ff6421667c5 32212->32213 33924 7ff642199d20 GetLastError 32213->33924 32215 7ff6421667ca 32216 7ff642167380 76 API calls 32215->32216 32217 7ff6421667e2 32216->32217 32218 7ff6421a8ee0 74 API calls 32217->32218 32220 7ff64216681a 32218->32220 32219 7ff64216552c 32219->32177 32219->32182 33930 7ff6421a8fa0 74 API calls 32219->33930 33925 7ff642199d20 GetLastError 32220->33925 32223 7ff64216681f 32224 7ff642167380 76 API calls 32223->32224 32225 7ff642166837 32224->32225 32228 7ff6421a8ee0 74 API calls 32225->32228 32230 7ff64216686f 32228->32230 32233 7ff6421a8970 74 API calls 32230->32233 32234 7ff64216687e 32233->32234 33926 7ff642199d20 GetLastError 32234->33926 32315 7ff642166606 32314->32315 32316 7ff6421654d9 32314->32316 32317 7ff6421a8ee0 74 API calls 32315->32317 33940 7ff64217f980 82 API calls 32316->33940 32318 7ff642166646 32317->32318 32320 7ff6421a8ee0 74 API calls 32318->32320 32321 7ff642166692 32320->32321 32325 7ff6421a8ee0 74 API calls 32321->32325 32322 7ff642166579 32323 7ff6421a8ee0 74 API calls 32322->32323 32324 7ff6421665af 32323->32324 32326 7ff6421a8ee0 74 API calls 32324->32326 32327 7ff6421666ce 32325->32327 32328 7ff6421665da 32326->32328 32329 7ff6421a8a40 74 API calls 32327->32329 32331 7ff6421a8970 74 API calls 32328->32331 32330 7ff642166705 32329->32330 32332 7ff642161480 2 API calls 32330->32332 32333 7ff6421665e9 32331->32333 32334 7ff642166711 32332->32334 32335 7ff6421a8970 74 API calls 32333->32335 32336 7ff642161c00 427 API calls 32334->32336 32337 7ff6421665f8 32335->32337 32338 7ff642166716 32336->32338 32337->32315 32339 7ff64218f5a0 81 API calls 32338->32339 32340 7ff64216671b 32339->32340 33933 7ff642199d20 GetLastError 32340->33933 32342 7ff642166720 32343 7ff642167380 76 API calls 32342->32343 32344 7ff642166738 32343->32344 32345 7ff6421a8ee0 74 API calls 32344->32345 32347 7ff642166770 32345->32347 32346 7ff64216552c 32346->32322 32346->32324 33941 7ff6421a8fa0 74 API calls 32346->33941 33934 7ff642199d20 GetLastError 32347->33934 32350 7ff642166775 32351 7ff642167380 76 API calls 32350->32351 32352 7ff64216678d 32351->32352 32353 7ff6421a8ee0 74 API calls 32352->32353 32356 7ff6421667c5 32353->32356 33935 7ff642199d20 GetLastError 32356->33935 32361 7ff6421667ca 32363 7ff642167380 76 API calls 32361->32363 32365 7ff6421667e2 32363->32365 32367 7ff6421a8ee0 74 API calls 32365->32367 32369 7ff64216681a 32367->32369 33936 7ff642199d20 GetLastError 32369->33936 32373 7ff64216681f 32375 7ff642167380 76 API calls 32373->32375 32377 7ff642166837 32375->32377 32379 7ff6421a8ee0 74 API calls 32377->32379 32381 7ff64216686f 32379->32381 32383 7ff6421a8970 74 API calls 32381->32383 32384 7ff64216687e 32383->32384 33937 7ff642199d20 GetLastError 32384->33937 32478 7ff642165731 32470->32478 32471 7ff6421665af 32472 7ff6421a8ee0 74 API calls 32471->32472 32473 7ff6421665da 32472->32473 32474 7ff6421a8970 74 API calls 32473->32474 32475 7ff6421665e9 32474->32475 32476 7ff6421a8970 74 API calls 32475->32476 32477 7ff6421665f8 32476->32477 32480 7ff6421a8ee0 74 API calls 32477->32480 32478->32471 33950 7ff6421a8fa0 74 API calls 32478->33950 32481 7ff642166646 32480->32481 32482 7ff6421a8ee0 74 API calls 32481->32482 32484 7ff642166692 32482->32484 32488 7ff6421a8ee0 74 API calls 32484->32488 32490 7ff6421666ce 32488->32490 32492 7ff6421a8a40 74 API calls 32490->32492 32493 7ff642166705 32492->32493 32495 7ff642161480 2 API calls 32493->32495 32497 7ff642166711 32495->32497 32499 7ff642161c00 427 API calls 32497->32499 32501 7ff642166716 32499->32501 32503 7ff64218f5a0 81 API calls 32501->32503 32505 7ff64216671b 32503->32505 33943 7ff642199d20 GetLastError 32505->33943 32509 7ff642166720 32511 7ff642167380 76 API calls 32509->32511 32513 7ff642166738 32511->32513 32514 7ff6421a8ee0 74 API calls 32513->32514 32515 7ff642166770 32514->32515 33944 7ff642199d20 GetLastError 32515->33944 32519 7ff642166775 32522 7ff642167380 76 API calls 32519->32522 32523 7ff64216678d 32522->32523 32525 7ff6421a8ee0 74 API calls 32523->32525 32527 7ff6421667c5 32525->32527 33945 7ff642199d20 GetLastError 32527->33945 32531 7ff6421667ca 32533 7ff642167380 76 API calls 32531->32533 32535 7ff6421667e2 32533->32535 32537 7ff6421a8ee0 74 API calls 32535->32537 32539 7ff64216681a 32537->32539 33946 7ff642199d20 GetLastError 32539->33946 32543 7ff64216681f 32657 7ff642163656 32623->32657 33960 7ff642192750 75 API calls 32623->33960 32625 7ff64218f680 GetProcessHeap HeapAlloc 32625->32657 32626 7ff6421665da 32627 7ff6421a8970 74 API calls 32626->32627 32628 7ff6421665e9 32627->32628 32629 7ff6421a8970 74 API calls 32628->32629 32631 7ff6421665f8 32629->32631 32632 7ff6421a8ee0 74 API calls 32631->32632 32633 7ff642166646 32632->32633 32634 7ff6421a8ee0 74 API calls 32633->32634 32636 7ff642166692 32634->32636 32635 7ff642163636 PdhCollectQueryData 32635->32657 32638 7ff6421a8ee0 74 API calls 32636->32638 32637 7ff642192880 91 API calls 32637->32657 32639 7ff6421666ce 32638->32639 32642 7ff6421a8a40 74 API calls 32639->32642 32640 7ff6421664a8 33973 7ff6421a8fa0 74 API calls 32640->33973 32641 7ff642166463 32644 7ff6421a8970 74 API calls 32641->32644 32643 7ff642166705 32642->32643 32650 7ff642161480 2 API calls 32643->32650 32651 7ff642166472 32644->32651 32645 7ff6421637b0 PdhOpenQueryA 32645->32657 32648 7ff642163b1d NtQuerySystemInformation 32649 7ff6421633d0 __FrameHandler3::FrameUnwindToEmptyState 32648->32649 32649->32648 32649->32651 32660 7ff642166481 32649->32660 32679 7ff642166384 32649->32679 32694 7ff64216644a 32649->32694 32703 7ff642166454 32649->32703 32713 7ff642163e5d HeapFree 32649->32713 32717 7ff642163f50 HeapFree 32649->32717 32722 7ff642164d50 Sleep 32649->32722 32726 7ff642164f99 HeapFree 32649->32726 32728 7ff642164fb5 HeapFree 32649->32728 32730 7ff6421651b0 HeapFree 32649->32730 32732 7ff642164a70 Sleep 32649->32732 32733 7ff642164feb HeapFree 32649->32733 32734 7ff64216500f HeapFree 32649->32734 32737 7ff64216491d AcquireSRWLockExclusive 32649->32737 32741 7ff6421650c5 HeapFree 32649->32741 32742 7ff642165054 HeapFree 32649->32742 32744 7ff6421650a0 HeapFree 32649->32744 32745 7ff642164b5d HeapFree 32649->32745 32748 7ff642165161 CloseHandle 32649->32748 32749 7ff642165077 HeapFree 32649->32749 32751 7ff64216508e HeapFree 32649->32751 32752 7ff642164bd1 HeapFree 32649->32752 32753 7ff642165100 PdhRemoveCounter 32649->32753 32755 7ff6421651e0 PdhCloseQuery 32649->32755 32757 7ff642164ba0 HeapFree 32649->32757 32758 7ff642164c20 HeapFree 32649->32758 32760 7ff642164c42 HeapFree 32649->32760 32762 7ff6421652ab HeapFree 32649->32762 32763 7ff642199350 74 API calls 32649->32763 32765 7ff642164cb1 HeapFree 32649->32765 32768 7ff642165272 HeapFree 32649->32768 32769 7ff642164dde FilterConnectCommunicationPort 32649->32769 32770 7ff642164c80 HeapFree 32649->32770 32771 7ff642164cd6 HeapFree 32649->32771 32772 7ff64216346f GlobalMemoryStatusEx 32649->32772 32774 7ff642164d10 HeapFree 32649->32774 32778 7ff64218f680 GetProcessHeap HeapAlloc 32649->32778 32787 7ff6421652c6 FilterSendMessage 32649->32787 33959 7ff642192750 75 API calls 32649->33959 33962 7ff6421aaed0 74 API calls 32649->33962 33963 7ff6421927c0 74 API calls 32649->33963 33964 7ff64216d990 84 API calls 32649->33964 33965 7ff642193210 177 API calls 32649->33965 33966 7ff6421aafa0 80 API calls 32649->33966 33967 7ff642161760 CloseHandle GetLastError HeapFree 32649->33967 32655 7ff642166711 32650->32655 32656 7ff6421a8970 74 API calls 32651->32656 32652 7ff642198c10 PdhGetFormattedCounterValue 32652->32657 32659 7ff642161c00 427 API calls 32655->32659 32656->32660 32657->32625 32657->32626 32657->32628 32657->32635 32657->32637 32657->32640 32657->32641 32657->32645 32657->32648 32657->32649 32657->32652 32661 7ff642163703 32657->32661 33961 7ff642198450 93 API calls 32657->33961 32658 7ff6421664cd 32662 7ff642198ef0 74 API calls 32658->32662 32663 7ff642166716 32659->32663 32669 7ff6421a8970 74 API calls 32660->32669 33969 7ff6421a8fa0 74 API calls 32661->33969 32664 7ff6421664d4 32662->32664 32665 7ff64218f5a0 81 API calls 32663->32665 32667 7ff642167380 76 API calls 32664->32667 32668 7ff64216671b 32665->32668 32670 7ff6421664f2 32667->32670 33952 7ff642199d20 GetLastError 32668->33952 32669->32640 32672 7ff6421a8ee0 74 API calls 32670->32672 32676 7ff642166523 32672->32676 32674 7ff642166720 32677 7ff642167380 76 API calls 32674->32677 32680 7ff642198ef0 74 API calls 32676->32680 32681 7ff642166738 32677->32681 32678 7ff6421a8970 74 API calls 32678->32679 32679->32678 32682 7ff6421a8a40 74 API calls 32679->32682 32688 7ff64216643e 32679->32688 33970 7ff642167790 74 API calls 32679->33970 33971 7ff6421a8fa0 74 API calls 32679->33971 32683 7ff64216652a 32680->32683 32684 7ff6421a8ee0 74 API calls 32681->32684 32682->32679 32686 7ff642167380 76 API calls 32683->32686 32687 7ff642166770 32684->32687 32689 7ff642166548 32686->32689 33953 7ff642199d20 GetLastError 32687->33953 32691 7ff6421a8970 74 API calls 32688->32691 32692 7ff6421a8ee0 74 API calls 32689->32692 32691->32694 32695 7ff642166579 32692->32695 32693 7ff642166775 32696 7ff642167380 76 API calls 32693->32696 33972 7ff64216c090 74 API calls 32694->33972 32700 7ff6421a8ee0 74 API calls 32695->32700 32697 7ff64216678d 32696->32697 32702 7ff6421a8ee0 74 API calls 32697->32702 32701 7ff6421665af 32700->32701 32704 7ff6421a8ee0 74 API calls 32701->32704 32705 7ff6421667c5 32702->32705 32706 7ff6421a8970 74 API calls 32703->32706 32704->32626 33954 7ff642199d20 GetLastError 32705->33954 32706->32641 32709 7ff6421667ca 32710 7ff642167380 76 API calls 32709->32710 32711 7ff6421667e2 32710->32711 32712 7ff6421a8ee0 74 API calls 32711->32712 32714 7ff64216681a 32712->32714 32713->32649 33955 7ff642199d20 GetLastError 32714->33955 32716 7ff64216681f 32718 7ff642167380 76 API calls 32716->32718 32717->32649 32719 7ff642166837 32718->32719 32720 7ff6421a8ee0 74 API calls 32719->32720 32721 7ff64216686f 32720->32721 32722->32649 32726->32649 32728->32649 32730->32649 32730->32733 32732->32649 32733->32649 32734->32649 32740 7ff642168b60 74 API calls 32737->32740 32740->32649 32741->32649 32742->32649 32744->32649 32744->32749 32745->32649 32748->32649 32754 7ff64216516b GetLastError 32748->32754 32749->32649 32751->32649 32752->32649 32753->32649 32754->32649 32755->32649 32757->32649 32758->32649 32758->32760 32760->32649 32762->32649 32763->32649 32765->32649 32768->32649 32769->32649 32769->32658 32770->32649 32771->32649 32775 7ff642163598 GetLastError 32772->32775 32776 7ff64216359e K32GetPerformanceInfo 32772->32776 32774->32649 32775->32776 32779 7ff6421635db 32776->32779 32778->32649 32779->32635 32779->32645 32787->32676 32791 7ff64216539a 32787->32791 32793 7ff64218f680 2 API calls 32791->32793 32801 7ff6421653ad 32793->32801 32801->32660 33968 7ff64217f980 82 API calls 32801->33968 32826 7ff64216552c 32826->32661 32826->32695 32826->32701 32839 7ff642164dde FilterConnectCommunicationPort 32838->32839 32840 7ff6421664cd 32839->32840 32925 7ff6421633d0 __FrameHandler3::FrameUnwindToEmptyState 32839->32925 32841 7ff642198ef0 74 API calls 32840->32841 32842 7ff6421664d4 32841->32842 32844 7ff642167380 76 API calls 32842->32844 32843 7ff642166481 32846 7ff6421a8970 74 API calls 32843->32846 32845 7ff6421664f2 32844->32845 32847 7ff6421a8ee0 74 API calls 32845->32847 32848 7ff6421664a8 32846->32848 32849 7ff642166523 32847->32849 33995 7ff6421a8fa0 74 API calls 32848->33995 32852 7ff642198ef0 74 API calls 32849->32852 32855 7ff64216652a 32852->32855 32854 7ff6421652c6 FilterSendMessage 32854->32849 32864 7ff64216539a 32854->32864 32856 7ff642167380 76 API calls 32855->32856 32858 7ff642166548 32856->32858 32857 7ff642164f99 HeapFree 32857->32925 32860 7ff6421a8ee0 74 API calls 32858->32860 32859 7ff642164fb5 HeapFree 32859->32925 32863 7ff642166579 32860->32863 32862 7ff6421651b0 HeapFree 32866 7ff642164feb HeapFree 32862->32866 32862->32925 32867 7ff6421a8ee0 74 API calls 32863->32867 32865 7ff64218f680 2 API calls 32864->32865 32875 7ff6421653ad 32865->32875 32866->32925 32869 7ff6421665af 32867->32869 32868 7ff64216500f HeapFree 32868->32925 32870 7ff6421a8ee0 74 API calls 32869->32870 32871 7ff6421665da 32870->32871 32873 7ff6421a8970 74 API calls 32871->32873 32872 7ff6421650c5 HeapFree 32872->32925 32876 7ff6421665e9 32873->32876 32874 7ff642165054 HeapFree 32874->32925 32875->32843 32884 7ff64216549f 32875->32884 32878 7ff6421a8970 74 API calls 32876->32878 32877 7ff6421650a0 HeapFree 32881 7ff642165077 HeapFree 32877->32881 32877->32925 32883 7ff6421665f8 32878->32883 32880 7ff642165161 CloseHandle 32885 7ff64216516b GetLastError 32880->32885 32880->32925 32881->32925 32882 7ff642165100 PdhRemoveCounter 32882->32925 32890 7ff6421a8ee0 74 API calls 32883->32890 33990 7ff64217f980 82 API calls 32884->33990 32885->32925 32886 7ff64216508e HeapFree 32886->32925 32887 7ff6421651e0 PdhCloseQuery 32887->32925 32888 7ff64216644a 33994 7ff64216c090 74 API calls 32888->33994 32892 7ff642166646 32890->32892 32891 7ff642166454 32895 7ff6421a8970 74 API calls 32891->32895 32896 7ff6421a8ee0 74 API calls 32892->32896 32893 7ff6421652ab HeapFree 32893->32925 32897 7ff642166463 32895->32897 32899 7ff642166692 32896->32899 32901 7ff6421a8970 74 API calls 32897->32901 32898 7ff642165272 HeapFree 32898->32925 32905 7ff6421a8ee0 74 API calls 32899->32905 32900 7ff64216346f GlobalMemoryStatusEx 32902 7ff642163598 GetLastError 32900->32902 32903 7ff64216359e K32GetPerformanceInfo 32900->32903 32904 7ff642166472 32901->32904 32902->32903 32903->32925 32906 7ff6421a8970 74 API calls 32904->32906 32907 7ff6421666ce 32905->32907 32906->32843 32910 7ff6421a8a40 74 API calls 32907->32910 32908 7ff642163636 PdhCollectQueryData 32908->32925 32909 7ff6421637b0 PdhOpenQueryA 32909->32925 32911 7ff642166705 32910->32911 32912 7ff642161480 2 API calls 32911->32912 32913 7ff642166711 32912->32913 32914 7ff642161c00 427 API calls 32913->32914 32915 7ff642166716 32914->32915 32917 7ff64218f5a0 81 API calls 32915->32917 32916 7ff64218f680 GetProcessHeap HeapAlloc 32916->32925 32919 7ff64216671b 32917->32919 32918 7ff642198c10 PdhGetFormattedCounterValue 32918->32925 33975 7ff642199d20 GetLastError 32919->33975 32921 7ff642163703 33991 7ff6421a8fa0 74 API calls 32921->33991 32923 7ff642166720 32924 7ff642167380 76 API calls 32923->32924 32929 7ff642166738 32924->32929 32925->32843 32925->32848 32925->32854 32925->32857 32925->32859 32925->32862 32925->32866 32925->32868 32925->32871 32925->32872 32925->32874 32925->32876 32925->32877 32925->32880 32925->32881 32925->32882 32925->32886 32925->32887 32925->32888 32925->32891 32925->32893 32925->32897 32925->32898 32925->32900 32925->32908 32925->32909 32925->32916 32925->32918 32925->32921 32926 7ff642163b1d NtQuerySystemInformation 32925->32926 32928 7ff642192880 91 API calls 32925->32928 32957 7ff642163b72 32925->32957 33982 7ff642192750 75 API calls 32925->33982 33983 7ff642198450 93 API calls 32925->33983 32926->32957 32928->32925 32931 7ff6421a8ee0 74 API calls 32929->32931 32934 7ff642166770 32931->32934 32932 7ff64216552c 32932->32863 32932->32869 32932->32921 32933 7ff64218f680 2 API calls 32933->32957 33976 7ff642199d20 GetLastError 32934->33976 32936 7ff6421a8970 74 API calls 32938 7ff642166384 32936->32938 32938->32936 32940 7ff6421a8a40 74 API calls 32938->32940 32944 7ff64216643e 32938->32944 33992 7ff642167790 74 API calls 32938->33992 33993 7ff6421a8fa0 74 API calls 32938->33993 32939 7ff642166775 32942 7ff642167380 76 API calls 32939->32942 32940->32938 32943 7ff64216678d 32942->32943 32945 7ff6421a8ee0 74 API calls 32943->32945 32947 7ff6421a8970 74 API calls 32944->32947 32948 7ff6421667c5 32945->32948 32947->32888 33977 7ff642199d20 GetLastError 32948->33977 32950 7ff6421667ca 32951 7ff642167380 76 API calls 32950->32951 32952 7ff6421667e2 32951->32952 32953 7ff6421a8ee0 74 API calls 32952->32953 32954 7ff64216681a 32953->32954 33978 7ff642199d20 GetLastError 32954->33978 32957->32839 32957->32843 32957->32904 32957->32925 32957->32926 32957->32933 32957->32938 32966 7ff642163e5d HeapFree 32957->32966 32970 7ff642163f50 HeapFree 32957->32970 32975 7ff642164d50 Sleep 32957->32975 32981 7ff642164a70 Sleep 32957->32981 32984 7ff64216491d AcquireSRWLockExclusive 32957->32984 32991 7ff642164b5d HeapFree 32957->32991 32994 7ff642164bd1 HeapFree 32957->32994 32995 7ff642164c20 HeapFree 32957->32995 32997 7ff642164ba0 HeapFree 32957->32997 32998 7ff642164c42 HeapFree 32957->32998 33000 7ff642199350 74 API calls 32957->33000 33002 7ff642164cb1 HeapFree 32957->33002 33003 7ff642164c80 HeapFree 32957->33003 33005 7ff642164cd6 HeapFree 32957->33005 33007 7ff642164d10 HeapFree 32957->33007 33984 7ff6421aaed0 74 API calls 32957->33984 33985 7ff6421927c0 74 API calls 32957->33985 33986 7ff64216d990 84 API calls 32957->33986 33987 7ff642193210 177 API calls 32957->33987 33988 7ff6421aafa0 80 API calls 32957->33988 33989 7ff642161760 CloseHandle GetLastError HeapFree 32957->33989 32958 7ff64216681f 32960 7ff642167380 76 API calls 32958->32960 32961 7ff642166837 32960->32961 32962 7ff6421a8ee0 74 API calls 32961->32962 32966->32957 32970->32957 32975->32925 32975->32957 32981->32957 32988 7ff642168b60 74 API calls 32984->32988 32988->32957 32991->32957 32994->32957 32995->32957 32995->32998 32997->32957 32998->32957 33000->32957 33002->32957 33003->32957 33005->32957 33007->32957 33127 7ff6421633d0 __FrameHandler3::FrameUnwindToEmptyState 33052->33127 34010 7ff642177de0 HeapFree HeapFree 33052->34010 33055 7ff6421a8a40 74 API calls 33058 7ff642166384 33055->33058 33056 7ff642164a70 Sleep 33193 7ff642163b72 33056->33193 33057 7ff642199350 74 API calls 33057->33127 33058->33055 33059 7ff6421a8970 74 API calls 33058->33059 33071 7ff64216643e 33058->33071 34015 7ff642167790 74 API calls 33058->34015 34016 7ff6421a8fa0 74 API calls 33058->34016 33059->33058 33060 7ff642164dde FilterConnectCommunicationPort 33062 7ff6421664cd 33060->33062 33060->33127 33061 7ff642164fb5 HeapFree 33061->33127 33063 7ff642198ef0 74 API calls 33062->33063 33067 7ff6421664d4 33063->33067 33064 7ff642164f99 HeapFree 33064->33127 33065 7ff6421651b0 HeapFree 33069 7ff642164feb HeapFree 33065->33069 33065->33127 33073 7ff642167380 76 API calls 33067->33073 33068 7ff642164b5d HeapFree 33068->33193 33069->33127 33070 7ff64216500f HeapFree 33070->33127 33075 7ff6421a8970 74 API calls 33071->33075 33072 7ff642166481 33079 7ff6421a8970 74 API calls 33072->33079 33076 7ff6421664f2 33073->33076 33074 7ff64216491d AcquireSRWLockExclusive 33078 7ff642168b60 74 API calls 33074->33078 33082 7ff64216644a 33075->33082 33083 7ff6421a8ee0 74 API calls 33076->33083 33078->33127 33086 7ff6421664a8 33079->33086 33080 7ff642164bd1 HeapFree 33080->33193 33081 7ff642164c20 HeapFree 33090 7ff642164c42 HeapFree 33081->33090 33081->33193 34017 7ff64216c090 74 API calls 33082->34017 33091 7ff642166523 33083->33091 33084 7ff642164ba0 HeapFree 33084->33193 33085 7ff6421650c5 HeapFree 33085->33127 34018 7ff6421a8fa0 74 API calls 33086->34018 33088 7ff642165054 HeapFree 33088->33127 33090->33193 33095 7ff642198ef0 74 API calls 33091->33095 33093 7ff642166454 33096 7ff6421a8970 74 API calls 33093->33096 33094 7ff6421650a0 HeapFree 33097 7ff642165077 HeapFree 33094->33097 33094->33127 33102 7ff64216652a 33095->33102 33104 7ff642166463 33096->33104 33097->33127 33100 7ff6421652c6 FilterSendMessage 33100->33091 33120 7ff64216539a 33100->33120 33101 7ff642165161 CloseHandle 33108 7ff64216516b GetLastError 33101->33108 33101->33127 33110 7ff642167380 76 API calls 33102->33110 33103 7ff642164cb1 HeapFree 33103->33193 33112 7ff6421a8970 74 API calls 33104->33112 33105 7ff64216508e HeapFree 33105->33127 33106 7ff642165100 PdhRemoveCounter 33106->33127 33107 7ff642164c80 HeapFree 33107->33193 33108->33127 33109 7ff6421651e0 PdhCloseQuery 33109->33127 33113 7ff642166548 33110->33113 33111 7ff642164cd6 HeapFree 33111->33193 33115 7ff642166472 33112->33115 33117 7ff6421a8ee0 74 API calls 33113->33117 33114 7ff642164d10 HeapFree 33114->33193 33118 7ff6421a8970 74 API calls 33115->33118 33121 7ff642166579 33117->33121 33118->33072 33119 7ff6421652ab HeapFree 33119->33127 33123 7ff64218f680 2 API calls 33120->33123 33124 7ff6421a8ee0 74 API calls 33121->33124 33134 7ff6421653ad 33123->33134 33125 7ff6421665af 33124->33125 33129 7ff6421a8ee0 74 API calls 33125->33129 33126 7ff642165272 HeapFree 33126->33127 33127->33056 33127->33057 33127->33058 33127->33060 33127->33061 33127->33064 33127->33065 33127->33069 33127->33070 33127->33072 33127->33074 33127->33082 33127->33085 33127->33086 33127->33088 33127->33093 33127->33094 33127->33097 33127->33100 33127->33101 33127->33104 33127->33105 33127->33106 33127->33109 33127->33119 33127->33126 33128 7ff64216346f GlobalMemoryStatusEx 33127->33128 33132 7ff6421665da 33127->33132 33135 7ff6421665e9 33127->33135 33136 7ff642163636 PdhCollectQueryData 33127->33136 33137 7ff6421637b0 PdhOpenQueryA 33127->33137 33140 7ff642198c10 PdhGetFormattedCounterValue 33127->33140 33141 7ff642192880 91 API calls 33127->33141 33148 7ff64218f680 GetProcessHeap HeapAlloc 33127->33148 33150 7ff642163703 33127->33150 33153 7ff642163b1d NtQuerySystemInformation 33127->33153 33127->33193 34004 7ff642192750 75 API calls 33127->34004 34005 7ff642198450 93 API calls 33127->34005 33130 7ff642163598 GetLastError 33128->33130 33131 7ff64216359e K32GetPerformanceInfo 33128->33131 33129->33132 33130->33131 33131->33127 33133 7ff6421a8970 74 API calls 33132->33133 33133->33135 33134->33072 33142 7ff64216549f 33134->33142 33138 7ff6421a8970 74 API calls 33135->33138 33136->33127 33137->33127 33139 7ff6421665f8 33138->33139 33143 7ff6421a8ee0 74 API calls 33139->33143 33140->33127 33141->33127 34013 7ff64217f980 82 API calls 33142->34013 33144 7ff642166646 33143->33144 33146 7ff6421a8ee0 74 API calls 33144->33146 33147 7ff642166692 33146->33147 33149 7ff6421a8ee0 74 API calls 33147->33149 33148->33127 33152 7ff6421666ce 33149->33152 34014 7ff6421a8fa0 74 API calls 33150->34014 33154 7ff6421a8a40 74 API calls 33152->33154 33153->33193 33157 7ff642166705 33154->33157 33159 7ff642161480 2 API calls 33157->33159 33158 7ff64218f680 2 API calls 33158->33193 33160 7ff642166711 33159->33160 33161 7ff642161c00 427 API calls 33160->33161 33162 7ff642166716 33161->33162 33163 7ff64218f5a0 81 API calls 33162->33163 33165 7ff64216671b 33163->33165 33997 7ff642199d20 GetLastError 33165->33997 33167 7ff642166720 33168 7ff642167380 76 API calls 33167->33168 33169 7ff642166738 33168->33169 33170 7ff6421a8ee0 74 API calls 33169->33170 33172 7ff642166770 33170->33172 33171 7ff64216552c 33171->33121 33171->33125 33171->33150 33998 7ff642199d20 GetLastError 33172->33998 33175 7ff642166775 33176 7ff642167380 76 API calls 33175->33176 33177 7ff64216678d 33176->33177 33179 7ff6421a8ee0 74 API calls 33177->33179 33180 7ff6421667c5 33179->33180 33999 7ff642199d20 GetLastError 33180->33999 33182 7ff6421667ca 33183 7ff642167380 76 API calls 33182->33183 33185 7ff6421667e2 33183->33185 33184 7ff642163e5d HeapFree 33184->33193 33186 7ff6421a8ee0 74 API calls 33185->33186 33187 7ff64216681a 33186->33187 34000 7ff642199d20 GetLastError 33187->34000 33188 7ff642163f50 HeapFree 33188->33193 33190 7ff64216681f 33191 7ff642167380 76 API calls 33190->33191 33192 7ff642166837 33191->33192 33195 7ff6421a8ee0 74 API calls 33192->33195 33193->33056 33193->33068 33193->33072 33193->33080 33193->33081 33193->33084 33193->33090 33193->33103 33193->33107 33193->33111 33193->33114 33193->33115 33193->33127 33193->33153 33193->33158 33193->33184 33193->33188 33194 7ff642164d50 Sleep 33193->33194 34006 7ff6421aaed0 74 API calls 33193->34006 34007 7ff6421927c0 74 API calls 33193->34007 34008 7ff64216d990 84 API calls 33193->34008 34009 7ff642193210 177 API calls 33193->34009 34011 7ff6421aafa0 80 API calls 33193->34011 34012 7ff642161760 CloseHandle GetLastError HeapFree 33193->34012 33194->33127 33194->33193 33196 7ff64216686f 33195->33196 33366 7ff6421633d0 __FrameHandler3::FrameUnwindToEmptyState 33267->33366 33268 7ff6421a8a40 74 API calls 33271 7ff642166384 33268->33271 33269 7ff642164a70 Sleep 33403 7ff642163b72 33269->33403 33270 7ff642199350 74 API calls 33270->33366 33271->33268 33272 7ff6421a8970 74 API calls 33271->33272 33284 7ff64216643e 33271->33284 34037 7ff642167790 74 API calls 33271->34037 34038 7ff6421a8fa0 74 API calls 33271->34038 33272->33271 33273 7ff642164dde FilterConnectCommunicationPort 33275 7ff6421664cd 33273->33275 33273->33366 33274 7ff642164fb5 HeapFree 33274->33366 33276 7ff642198ef0 74 API calls 33275->33276 33280 7ff6421664d4 33276->33280 33277 7ff642164f99 HeapFree 33277->33366 33278 7ff6421651b0 HeapFree 33282 7ff642164feb HeapFree 33278->33282 33278->33366 33286 7ff642167380 76 API calls 33280->33286 33281 7ff642164b5d HeapFree 33281->33403 33282->33366 33283 7ff64216500f HeapFree 33283->33366 33289 7ff6421a8970 74 API calls 33284->33289 33285 7ff642166481 33293 7ff6421a8970 74 API calls 33285->33293 33290 7ff6421664f2 33286->33290 33287 7ff64216491d AcquireSRWLockExclusive 33292 7ff642168b60 74 API calls 33287->33292 33296 7ff64216644a 33289->33296 33297 7ff6421a8ee0 74 API calls 33290->33297 33292->33366 33300 7ff6421664a8 33293->33300 33294 7ff642164bd1 HeapFree 33294->33403 33295 7ff642164c20 HeapFree 33304 7ff642164c42 HeapFree 33295->33304 33295->33403 34039 7ff64216c090 74 API calls 33296->34039 33305 7ff642166523 33297->33305 33298 7ff642164ba0 HeapFree 33298->33403 33299 7ff6421650c5 HeapFree 33299->33366 34040 7ff6421a8fa0 74 API calls 33300->34040 33302 7ff642165054 HeapFree 33302->33366 33304->33403 33309 7ff642198ef0 74 API calls 33305->33309 33307 7ff642166454 33310 7ff6421a8970 74 API calls 33307->33310 33308 7ff6421650a0 HeapFree 33311 7ff642165077 HeapFree 33308->33311 33308->33366 33316 7ff64216652a 33309->33316 33318 7ff642166463 33310->33318 33311->33366 33314 7ff6421652c6 FilterSendMessage 33314->33305 33334 7ff64216539a 33314->33334 33315 7ff642165161 CloseHandle 33322 7ff64216516b GetLastError 33315->33322 33315->33366 33324 7ff642167380 76 API calls 33316->33324 33317 7ff642164cb1 HeapFree 33317->33403 33326 7ff6421a8970 74 API calls 33318->33326 33319 7ff64216508e HeapFree 33319->33366 33320 7ff642165100 PdhRemoveCounter 33320->33366 33321 7ff642164c80 HeapFree 33321->33403 33322->33366 33323 7ff6421651e0 PdhCloseQuery 33323->33366 33327 7ff642166548 33324->33327 33325 7ff642164cd6 HeapFree 33325->33403 33329 7ff642166472 33326->33329 33331 7ff6421a8ee0 74 API calls 33327->33331 33328 7ff642164d10 HeapFree 33328->33403 33332 7ff6421a8970 74 API calls 33329->33332 33335 7ff642166579 33331->33335 33332->33285 33333 7ff6421652ab HeapFree 33333->33366 33337 7ff64218f680 2 API calls 33334->33337 33339 7ff6421a8ee0 74 API calls 33335->33339 33348 7ff6421653ad 33337->33348 33338 7ff64218f680 GetProcessHeap HeapAlloc 33338->33366 33340 7ff6421665af 33339->33340 33343 7ff6421a8ee0 74 API calls 33340->33343 33341 7ff642165272 HeapFree 33341->33366 33342 7ff64216346f GlobalMemoryStatusEx 33344 7ff642163598 GetLastError 33342->33344 33345 7ff64216359e K32GetPerformanceInfo 33342->33345 33346 7ff6421665da 33343->33346 33344->33345 33345->33366 33347 7ff6421a8970 74 API calls 33346->33347 33349 7ff6421665e9 33347->33349 33348->33285 33356 7ff64216549f 33348->33356 33352 7ff6421a8970 74 API calls 33349->33352 33350 7ff642163636 PdhCollectQueryData 33350->33366 33351 7ff6421637b0 PdhOpenQueryA 33351->33366 33353 7ff6421665f8 33352->33353 33357 7ff6421a8ee0 74 API calls 33353->33357 33354 7ff642198c10 PdhGetFormattedCounterValue 33354->33366 33355 7ff642192880 91 API calls 33355->33366 34035 7ff64217f980 82 API calls 33356->34035 33358 7ff642166646 33357->33358 33360 7ff6421a8ee0 74 API calls 33358->33360 33361 7ff642166692 33360->33361 33362 7ff6421a8ee0 74 API calls 33361->33362 33365 7ff6421666ce 33362->33365 33363 7ff642163703 34036 7ff6421a8fa0 74 API calls 33363->34036 33368 7ff6421a8a40 74 API calls 33365->33368 33366->33269 33366->33270 33366->33271 33366->33273 33366->33274 33366->33277 33366->33278 33366->33282 33366->33283 33366->33285 33366->33287 33366->33296 33366->33299 33366->33300 33366->33302 33366->33307 33366->33308 33366->33311 33366->33314 33366->33315 33366->33318 33366->33319 33366->33320 33366->33323 33366->33333 33366->33338 33366->33341 33366->33342 33366->33346 33366->33349 33366->33350 33366->33351 33366->33354 33366->33355 33366->33363 33367 7ff642163b1d NtQuerySystemInformation 33366->33367 33366->33403 34027 7ff642192750 75 API calls 33366->34027 34028 7ff642198450 93 API calls 33366->34028 33367->33403 33371 7ff642166705 33368->33371 33373 7ff642161480 2 API calls 33371->33373 33372 7ff64218f680 2 API calls 33372->33403 33374 7ff642166711 33373->33374 33375 7ff642161c00 427 API calls 33374->33375 33376 7ff642166716 33375->33376 33377 7ff64218f5a0 81 API calls 33376->33377 33379 7ff64216671b 33377->33379 34020 7ff642199d20 GetLastError 33379->34020 33381 7ff642166720 33382 7ff642167380 76 API calls 33381->33382 33383 7ff642166738 33382->33383 33384 7ff6421a8ee0 74 API calls 33383->33384 33386 7ff642166770 33384->33386 33385 7ff64216552c 33385->33335 33385->33340 33385->33363 34021 7ff642199d20 GetLastError 33386->34021 33389 7ff642166775 33390 7ff642167380 76 API calls 33389->33390 33391 7ff64216678d 33390->33391 33393 7ff6421a8ee0 74 API calls 33391->33393 33394 7ff6421667c5 33393->33394 34022 7ff642199d20 GetLastError 33394->34022 33396 7ff6421667ca 33397 7ff642167380 76 API calls 33396->33397 33399 7ff6421667e2 33397->33399 33398 7ff642163e5d HeapFree 33398->33403 33400 7ff6421a8ee0 74 API calls 33399->33400 33401 7ff64216681a 33400->33401 34023 7ff642199d20 GetLastError 33401->34023 33402 7ff642163f50 HeapFree 33402->33403 33403->33269 33403->33281 33403->33285 33403->33294 33403->33295 33403->33298 33403->33304 33403->33317 33403->33321 33403->33325 33403->33328 33403->33329 33403->33366 33403->33367 33403->33372 33403->33398 33403->33402 33408 7ff642164d50 Sleep 33403->33408 34029 7ff6421aaed0 74 API calls 33403->34029 34030 7ff6421927c0 74 API calls 33403->34030 34031 7ff64216d990 84 API calls 33403->34031 34032 7ff642193210 177 API calls 33403->34032 34033 7ff6421aafa0 80 API calls 33403->34033 34034 7ff642161760 CloseHandle GetLastError HeapFree 33403->34034 33405 7ff64216681f 33406 7ff642167380 76 API calls 33405->33406 33407 7ff642166837 33406->33407 33409 7ff6421a8ee0 74 API calls 33407->33409 33408->33366 33408->33403 33410 7ff64216686f 33409->33410 33482 7ff642193130 33481->33482 33483 7ff6421928a1 GetSystemInfo 33481->33483 33482->30230 33484 7ff642192900 33483->33484 33525 7ff642192a8b 33483->33525 33485 7ff64218f680 2 API calls 33484->33485 33491 7ff64219291d 33485->33491 33486 7ff6421931dd 33487 7ff6421a8970 74 API calls 33486->33487 33490 7ff6421931ec 33487->33490 33488 7ff6421931c1 33489 7ff6421a8970 74 API calls 33488->33489 33493 7ff6421931d0 33489->33493 33494 7ff6421a8970 74 API calls 33490->33494 33491->33486 33492 7ff6421929b7 33491->33492 33580 7ff642198130 74 API calls 33491->33580 33496 7ff64218f680 2 API calls 33492->33496 33497 7ff6421a8970 74 API calls 33493->33497 33498 7ff6421931fb 33494->33498 33500 7ff6421929ca 33496->33500 33497->33486 33603 7ff6421a8b80 74 API calls 33498->33603 33499 7ff642198070 74 API calls 33499->33525 33500->33490 33500->33525 33581 7ff642198070 74 API calls 33500->33581 33504 7ff642192a14 33582 7ff642198070 74 API calls 33504->33582 33506 7ff642192a20 33583 7ff642198070 74 API calls 33506->33583 33508 7ff6421931af 33602 7ff642167790 74 API calls 33508->33602 33509 7ff642192b13 HeapFree 33509->33525 33510 7ff64218f680 GetProcessHeap HeapAlloc 33510->33525 33511 7ff642192b2d HeapFree 33511->33525 33513 7ff642192c52 33514 7ff6421a8970 74 API calls 33513->33514 33514->33488 33516 7ff642192d31 33517 7ff6421a8970 74 API calls 33516->33517 33523 7ff642192cc5 33517->33523 33518 7ff642192c97 HeapFree 33518->33525 33519 7ff642192a2c 33521 7ff642198070 74 API calls 33519->33521 33519->33525 33520 7ff642192cb5 33584 7ff6421981f0 78 API calls 33520->33584 33521->33519 33524 7ff64218f680 2 API calls 33523->33524 33543 7ff642192d79 33524->33543 33525->33488 33525->33498 33525->33499 33525->33508 33525->33509 33525->33510 33525->33511 33525->33513 33525->33516 33525->33518 33525->33520 33525->33523 33527 7ff6421a8970 74 API calls 33525->33527 33601 7ff6421a8b80 74 API calls 33525->33601 33526 7ff642192fe9 33528 7ff642193032 33526->33528 33529 7ff64219301b HeapFree 33526->33529 33527->33525 33530 7ff642193044 HeapFree 33528->33530 33531 7ff642193058 33528->33531 33529->33528 33530->33531 33533 7ff642193071 33531->33533 33534 7ff64219305d HeapFree 33531->33534 33535 7ff642193118 33533->33535 33537 7ff6421930b0 HeapFree 33533->33537 33538 7ff642193100 HeapFree 33533->33538 33539 7ff6421930d3 HeapFree 33533->33539 33541 7ff6421930ea HeapFree 33533->33541 33534->33533 33535->33482 33536 7ff64219311e HeapFree 33535->33536 33536->33482 33537->33533 33538->33533 33538->33539 33539->33533 33540 7ff64218f680 GetProcessHeap HeapAlloc 33540->33543 33541->33533 33543->33493 33543->33508 33543->33513 33543->33526 33543->33540 33585 7ff642167b00 33543->33585 33600 7ff642198390 74 API calls 33543->33600 33545 7ff642161499 33544->33545 33546 7ff6421614d1 33544->33546 33545->33546 33549 7ff6421614c0 HeapFree 33545->33549 33547 7ff6421614d8 HeapFree 33546->33547 33548 7ff6421614f4 33546->33548 33547->33548 33548->30252 33549->33545 33605 7ff64218f5b0 80 API calls 33550->33605 33552 7ff64218f5a9 33606 7ff64218f610 ExitProcess 33552->33606 33555->30230 33556->30230 33557->30268 33558->30268 33559->30230 33560->30230 33561->30268 33562->30268 33563->30293 33570 7ff64218f680 2 API calls 33569->33570 33571 7ff6421673af 33570->33571 33572 7ff642167491 33571->33572 33576 7ff6421673b8 33571->33576 33573 7ff6421a8970 74 API calls 33572->33573 33578 7ff642167439 33573->33578 33575 7ff6421a8ee0 74 API calls 33577 7ff6421674e2 33575->33577 33576->33578 33607 7ff6421a8860 76 API calls 33576->33607 33578->33575 33579 7ff6421664f2 33578->33579 33579->30170 33580->33491 33581->33504 33582->33506 33583->33519 33584->33523 33586 7ff642167bed 33585->33586 33592 7ff642167b28 33585->33592 33587 7ff642168b60 74 API calls 33586->33587 33588 7ff642167c17 33587->33588 33589 7ff642167c1b 33588->33589 33590 7ff6421a8ee0 74 API calls 33588->33590 33589->33543 33591 7ff642167c5b 33590->33591 33604 7ff642167790 74 API calls 33591->33604 33592->33586 33592->33591 33594 7ff64218f680 2 API calls 33592->33594 33596 7ff642167bdb 33594->33596 33596->33586 33599 7ff6421a8970 74 API calls 33596->33599 33599->33586 33600->33543 33605->33552 33607->33576 33609->30638 33610->30655 33611->30664 33612->30676 33616->30597 33617->30597 33618->30597 33619->30597 33620->30597 33621->30597 33622->30597 33623->30597 33624->30666 33714 7ff642181a20 33631->33714 33678->30786 33679->30799 33680->30806 33681->30839 33682->30839 33683->30839 33684->30797 33685->30798 33686->30803 33687->30827 33688->30844 33705->30825 33706->30845 33707->30857 33708->30869 33709->30884 33741 7ff64217fe30 33714->33741 33823->31273 33824->31286 33825->31293 33826->31326 33827->31326 33828->31326 33829->31284 33830->31285 33831->31290 33832->31314 33833->31331 33850->31312 33851->31332 33852->31344 33853->31356 33860 7ff642193f75 HeapFree 33859->33860 33861 7ff642193f88 33859->33861 33860->33861 33862 7ff642193fd1 33861->33862 33865 7ff642193fc0 HeapFree 33861->33865 33863 7ff642193fd8 HeapFree 33862->33863 33864 7ff642193fea 33862->33864 33863->33864 33866 7ff642194011 HeapFree 33864->33866 33867 7ff642193ff6 33864->33867 33865->33861 33868 7ff642194030 HeapFree 33866->33868 33869 7ff642194002 33866->33869 33867->33868 33867->33869 33868->33869 33870 7ff64219400f 33868->33870 33869->33870 33873 7ff642194070 HeapFree 33869->33873 33871 7ff642194088 HeapFree 33870->33871 33872 7ff64219409a 33870->33872 33871->33872 33874 7ff6421940c6 HeapFree 33872->33874 33875 7ff6421940a9 33872->33875 33873->33869 33876 7ff6421940b8 33874->33876 33877 7ff6421940eb HeapFree 33874->33877 33875->33876 33875->33877 33876->31726 33877->33876 33878->31845 33879->31853 33880->31860 33881->31866 33885->31763 33886->31763 33887->31761 33888->31761 33889->31761 33890->31761 33891->31761 33892->31761 33893->31859 33900->32041 33901->32041 33902->31976 33903->32041 33904->32041 33905->32041 33906->31976 33907->32041 33908->32051 33914->32049 33915->32064 33916->32071 33917->32078 33922->32203 33923->32209 33924->32215 33925->32223 33929->32219 33933->32342 33934->32350 33935->32361 33936->32373 33940->32346 33943->32509 33944->32519 33945->32531 33946->32543 33952->32674 33953->32693 33954->32709 33955->32716 33959->32649 33960->32657 33961->32657 33962->32649 33963->32649 33964->32649 33965->32649 33966->32649 33967->32649 33968->32826 33975->32923 33976->32939 33977->32950 33978->32958 33982->32925 33983->32925 33984->32957 33985->32957 33986->32957 33987->32957 33988->32957 33989->32957 33990->32932 33997->33167 33998->33175 33999->33182 34000->33190 34004->33127 34005->33127 34006->33193 34007->33193 34008->33193 34009->33193 34010->33127 34011->33193 34012->33193 34013->33171 34020->33381 34021->33389 34022->33396 34023->33405 34027->33366 34028->33366 34029->33403 34030->33403 34031->33403 34032->33403 34033->33403 34034->33403 34035->33385 34043 7ff64219177d 34042->34043 34046 7ff6421917b0 34043->34046 34049 7ff6421917c0 34046->34049 34048 7ff6421917b9 34051 7ff6421917e3 34049->34051 34050 7ff64219183b 34057 7ff6421918c0 34050->34057 34051->34050 34053 7ff6421918c0 73 API calls 34051->34053 34053->34050 34055 7ff6421918a0 HeapFree 34055->34048 34056 7ff64219189a 34056->34048 34058 7ff642191902 34057->34058 34059 7ff642191eea 34057->34059 34061 7ff642191f74 34058->34061 34062 7ff642191925 AcquireSRWLockShared 34058->34062 34092 7ff642178ac0 74 API calls 34059->34092 34093 7ff642178ac0 74 API calls 34061->34093 34063 7ff642191991 34062->34063 34072 7ff64219199a 34062->34072 34084 7ff642192390 34063->34084 34065 7ff642191fc2 34067 7ff642191879 34065->34067 34095 7ff64216c0b0 HeapFree HeapFree 34065->34095 34066 7ff642191f65 34066->34065 34094 7ff642177de0 HeapFree HeapFree 34066->34094 34067->34055 34067->34056 34069 7ff6421919e2 ReleaseSRWLockShared 34069->34072 34071 7ff642168b60 70 API calls 34071->34072 34072->34069 34072->34071 34076 7ff642190e70 HeapFree HeapFree AcquireSRWLockExclusive ReleaseSRWLockExclusive 34072->34076 34078 7ff642182820 70 API calls 34072->34078 34079 7ff642191dc1 AcquireSRWLockExclusive 34072->34079 34080 7ff64216d0e0 HeapFree HeapFree 34072->34080 34081 7ff6421a8ee0 70 API calls 34072->34081 34082 7ff642191e31 ReleaseSRWLockExclusive 34072->34082 34088 7ff642177de0 HeapFree HeapFree 34072->34088 34089 7ff642177de0 HeapFree HeapFree 34072->34089 34090 7ff6421786c0 74 API calls 34072->34090 34091 7ff64216c0b0 HeapFree HeapFree 34072->34091 34076->34072 34078->34072 34079->34072 34080->34072 34081->34072 34082->34072 34085 7ff6421923e1 34084->34085 34086 7ff6421923b5 34084->34086 34085->34072 34087 7ff642168b60 74 API calls 34086->34087 34087->34085 34088->34072 34089->34072 34090->34072 34091->34072 34092->34066 34093->34066 34094->34065 34095->34067 34099 7ff642192730 74 API calls 34096->34099 34098 7ff642167789 34099->34098
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$Free$FilterProcess$CloseCommandCommunicationConnectCurrentHandleLineMessagePortSend
            • String ID: 145610$Altitude$DefaultInstance$Instances$SeLoadDriverPrivilege$Total CP$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value$global_key_idle disappearedC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\system.rs$key_used disappeared$lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs$prox.sys
            • API String ID: 3801287639-683359153
            • Opcode ID: 0a1ee703c9f6c6cd9522429e7abf1e7fd968c1f66fe1a50610399dca9d061c00
            • Instruction ID: 7b1e6de750f9fb0f953e8c6742ce2964aef5df632fa5acdad0d655a83e8a984e
            • Opcode Fuzzy Hash: 0a1ee703c9f6c6cd9522429e7abf1e7fd968c1f66fe1a50610399dca9d061c00
            • Instruction Fuzzy Hash: EC232C71A0CA8295E720BF65D8803ED2361FB4578CF605136DA4DC7A99DFBEE249CB40
            APIs
              • Part of subcall function 00007FF642199350: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FF642161C1A), ref: 00007FF64219937D
              • Part of subcall function 00007FF642199350: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FF642161C1A), ref: 00007FF64219938B
            • FilterConnectCommunicationPort.FLTLIB ref: 00007FF642161C53
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$AllocCommunicationConnectFilterPortProcess
            • String ID: 145610$SeLoadDriverPrivilege$Total CP$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value$global_key_idle disappearedC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\system.rs$key_used disappeared$lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs$prox.sys$stdoutlibrary\std\src\io\mod.rsadvancing io slices beyond their length
            • API String ID: 2225638886-153109950
            • Opcode ID: 46c5eb8db75e555b86b91304e8d49010e0b424edc22671c436a7487e04be387b
            • Instruction ID: 94077b174db7dba0f2eec4378df8d65ade4c17c6b0108b6c2e036cd201206950
            • Opcode Fuzzy Hash: 46c5eb8db75e555b86b91304e8d49010e0b424edc22671c436a7487e04be387b
            • Instruction Fuzzy Hash: 61332B32A0DA8295E720BF25D8807ED23A0FB44788F645136DA4DC7B99DFBEE645C740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1681 7ff6421654b8-7ff6421654d3 1682 7ff642166606-7ff64216660e 1681->1682 1683 7ff6421654d9-7ff64216553d call 7ff64217f980 1681->1683 1685 7ff642166612-7ff6421669ba call 7ff6421a8ee0 * 3 call 7ff6421a8a40 call 7ff642161480 call 7ff642161c00 call 7ff64218f5a0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff6421a8970 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff6421a8970 call 7ff6421a8ee0 1682->1685 1693 7ff642166579-7ff6421665aa call 7ff6421a8ee0 1683->1693 1694 7ff642165543-7ff6421656b8 call 7ff64219ac20 1683->1694 1825 7ff6421669bc-7ff6421669c0 1685->1825 1826 7ff6421669c6-7ff642166a0d call 7ff6421a8a40 1685->1826 1698 7ff6421665af-7ff642166604 call 7ff6421a8ee0 call 7ff6421a8970 * 2 1693->1698 1711 7ff642165773-7ff64216577a 1694->1711 1712 7ff642165731-7ff642165762 1694->1712 1698->1685 1711->1712 1717 7ff64216577e-7ff6421657c6 call 7ff642167f90 1711->1717 1712->1711 1712->1717 1717->1698 1726 7ff6421657cc-7ff6421658a5 call 7ff64219ac20 1717->1726 1739 7ff64216636c-7ff642166387 call 7ff6421a8fa0 1726->1739 1740 7ff6421658ac call 7ff6421833f0 1726->1740 1747 7ff64216638d-7ff64216640f call 7ff642167790 call 7ff6421a8a40 1739->1747 1748 7ff642166411-7ff642166438 call 7ff6421a8970 call 7ff6421a8fa0 1739->1748 1740->1739 1747->1748 1748->1747 1761 7ff64216643e-7ff642166574 call 7ff6421a8970 call 7ff64216c090 call 7ff6421a8970 * 3 call 7ff6421a8c00 call 7ff6421a8970 call 7ff6421a8fa0 call 7ff6421a8970 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 1748->1761 1761->1693 1825->1826 1828 7ff642166a12-7ff642166a48 call 7ff6421a8ee0 1826->1828 1831 7ff642166a4a-7ff642166a4d 1828->1831 1832 7ff642166a53-7ff642166cf8 call 7ff642167380 call 7ff6421a8910 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 1828->1832 1831->1832 1873 7ff642166cfa-7ff642166d07 HeapFree 1832->1873 1874 7ff642166d0d-7ff642166d34 1832->1874 1873->1874
            APIs
            • HeapFree.KERNEL32 ref: 00007FF642165520
              • Part of subcall function 00007FF64218F680: GetProcessHeap.KERNEL32(?,?,?,?,00007FF64217875D,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218F697
              • Part of subcall function 00007FF642199D20: GetLastError.KERNEL32 ref: 00007FF642199D24
              • Part of subcall function 00007FF642198EF0: GetErrorInfo.OLEAUT32 ref: 00007FF642198F0F
              • Part of subcall function 00007FF642198EF0: GetErrorInfo.OLEAUT32 ref: 00007FF642198FFD
              • Part of subcall function 00007FF642198EF0: SysStringLen.OLEAUT32 ref: 00007FF642199049
              • Part of subcall function 00007FF642198EF0: GetProcessHeap.KERNEL32 ref: 00007FF642199064
              • Part of subcall function 00007FF642198EF0: HeapAlloc.KERNEL32 ref: 00007FF642199072
              • Part of subcall function 00007FF642198EF0: SysFreeString.OLEAUT32 ref: 00007FF64219919B
            • HeapFree.KERNEL32 ref: 00007FF642166D07
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$ErrorFree$InfoProcessString$AllocLast
            • String ID: 145610$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value$global_key_idle disappearedC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\system.rs$key_used disappeared$lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs
            • API String ID: 133633711-915087304
            • Opcode ID: c3eeafcea2793982fd05e86c101eb800588e8e9ef9211cc381196d77aa50fe25
            • Instruction ID: 5d6030e062f6fccee96ced01f538b746d401f6fbe8ec6518dc94331e66091915
            • Opcode Fuzzy Hash: c3eeafcea2793982fd05e86c101eb800588e8e9ef9211cc381196d77aa50fe25
            • Instruction Fuzzy Hash: 5AD25C31A0CA8295EB20BF25D8403ED23A1FB44798F645136CA5DC7B99DFBEE645C740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1875 7ff6421991c0-7ff6421991e8 LoadLibraryExA 1876 7ff642199214-7ff64219922c GetErrorInfo 1875->1876 1877 7ff6421991ea-7ff642199200 GetProcAddress 1875->1877 1880 7ff64219928f-7ff64219929e call 7ff642198ef0 1876->1880 1881 7ff64219922e-7ff642199236 1876->1881 1878 7ff642199202-7ff642199209 1877->1878 1879 7ff64219920b-7ff64219920e FreeLibrary 1877->1879 1878->1876 1879->1876 1885 7ff6421992a0-7ff6421992a3 1880->1885 1890 7ff6421992a9-7ff6421992ac 1880->1890 1882 7ff6421992ed-7ff6421992f5 1881->1882 1883 7ff64219923c-7ff642199260 1881->1883 1882->1885 1886 7ff6421992f7 1882->1886 1883->1885 1893 7ff642199262-7ff64219926f call 7ff642198ef0 1883->1893 1885->1890 1886->1890 1891 7ff6421992ae-7ff6421992b1 1890->1891 1892 7ff6421992dc-7ff6421992ec 1890->1892 1891->1892 1894 7ff6421992b3-7ff6421992ce 1891->1894 1901 7ff642199271-7ff642199274 1893->1901 1902 7ff64219927a-7ff64219928b 1893->1902 1896 7ff6421992d0-7ff6421992d6 1894->1896 1897 7ff6421992f9-7ff6421992fb 1894->1897 1899 7ff642199313-7ff64219935a call 7ff6421a8a40 1896->1899 1900 7ff6421992d8-7ff6421992da 1896->1900 1897->1892 1903 7ff6421992fd-7ff642199311 GetProcessHeap HeapFree 1897->1903 1909 7ff642199360-7ff64219936a 1899->1909 1910 7ff6421994d4 1899->1910 1900->1892 1900->1903 1901->1902 1902->1885 1907 7ff64219928d 1902->1907 1903->1892 1907->1890 1912 7ff6421994de-7ff6421994e5 1909->1912 1913 7ff642199370-7ff642199394 GetProcessHeap HeapAlloc 1909->1913 1911 7ff6421994d6-7ff6421994dd 1910->1911 1914 7ff6421994f1-7ff642199597 call 7ff6421a8ee0 call 7ff6421691b0 1912->1914 1915 7ff6421994e7 1913->1915 1916 7ff64219939a-7ff6421993c2 1913->1916 1935 7ff642199661-7ff642199663 1914->1935 1936 7ff64219959d-7ff6421995e7 1914->1936 1915->1914 1918 7ff6421994ec call 7ff642198ef0 1915->1918 1917 7ff6421993f1-7ff6421993f5 1916->1917 1920 7ff6421993d3 1917->1920 1921 7ff6421993f7-7ff6421993fa 1917->1921 1918->1914 1925 7ff6421993d6-7ff6421993ee 1920->1925 1923 7ff642199400-7ff64219940b 1921->1923 1924 7ff6421994c6-7ff6421994d2 1921->1924 1927 7ff6421993d0 1923->1927 1928 7ff64219940d-7ff64219941f 1923->1928 1924->1911 1925->1917 1927->1920 1930 7ff642199421-7ff642199434 1928->1930 1931 7ff64219946d-7ff64219947b 1928->1931 1933 7ff642199480-7ff642199495 1930->1933 1934 7ff642199436-7ff642199458 1930->1934 1931->1920 1933->1920 1938 7ff64219949b-7ff6421994c1 1933->1938 1934->1924 1937 7ff64219945a-7ff642199465 1934->1937 1939 7ff642199685-7ff6421996c5 FormatMessageW 1935->1939 1944 7ff6421995fe-7ff642199606 1936->1944 1945 7ff6421995e9-7ff6421995f3 call 7ff642198ef0 1936->1945 1937->1920 1940 7ff64219946b 1937->1940 1938->1925 1942 7ff642199865-7ff642199868 1939->1942 1943 7ff6421996cb-7ff6421996d6 1939->1943 1940->1938 1946 7ff64219986a-7ff64219987e GetProcessHeap HeapFree 1942->1946 1947 7ff6421998bc-7ff6421998f3 call 7ff6421691b0 1942->1947 1948 7ff6421996f0-7ff6421996fb 1943->1948 1953 7ff64219960e-7ff642199614 1944->1953 1954 7ff642199608 SysFreeString 1944->1954 1945->1944 1963 7ff6421995f5-7ff6421995f8 1945->1963 1946->1947 1966 7ff6421998f5-7ff6421998f9 1947->1966 1967 7ff64219991d-7ff64219991f 1947->1967 1951 7ff6421996e0-7ff6421996ea 1948->1951 1952 7ff6421996fd-7ff642199700 1948->1952 1951->1948 1956 7ff642199860 1951->1956 1952->1951 1958 7ff642199702-7ff642199723 GetProcessHeap HeapAlloc 1952->1958 1959 7ff642199665-7ff64219966d 1953->1959 1960 7ff642199616-7ff64219961e 1953->1960 1954->1953 1956->1942 1968 7ff642199846-7ff642199853 call 7ff642198ef0 1958->1968 1969 7ff642199729-7ff64219974a 1958->1969 1964 7ff64219966f SysFreeString 1959->1964 1965 7ff642199675-7ff64219967d 1959->1965 1961 7ff642199624-7ff64219962c SysStringLen 1960->1961 1962 7ff642199779-7ff642199782 1960->1962 1961->1962 1971 7ff642199632-7ff64219963d 1961->1971 1972 7ff642199643-7ff642199648 1962->1972 1973 7ff642199788-7ff642199793 SysStringLen 1962->1973 1963->1944 1964->1965 1965->1939 1974 7ff64219967f SysFreeString 1965->1974 1975 7ff642199922-7ff64219992a 1966->1975 1976 7ff6421998fb-7ff642199904 1966->1976 1967->1975 1989 7ff64219985e 1968->1989 1990 7ff642199855-7ff642199858 1968->1990 1977 7ff642199750-7ff642199766 1969->1977 1971->1972 1971->1973 1981 7ff64219964e-7ff642199656 1972->1981 1982 7ff6421998ac-7ff6421998b4 1972->1982 1983 7ff642199799-7ff6421997a4 1973->1983 1984 7ff642199898 1973->1984 1974->1939 1978 7ff6421999a3-7ff6421999b0 1975->1978 1979 7ff64219992c-7ff642199938 1975->1979 1985 7ff64219997f-7ff64219998e 1976->1985 1986 7ff642199906-7ff64219991b 1976->1986 1977->1977 1987 7ff642199768-7ff642199774 1977->1987 1979->1978 1988 7ff64219993a-7ff642199955 1979->1988 1991 7ff6421998b6 SysFreeString 1981->1991 1992 7ff64219965c 1981->1992 1982->1947 1982->1991 1994 7ff6421997c0-7ff6421997cb 1983->1994 1993 7ff64219989a-7ff6421998a6 SysFreeString 1984->1993 1995 7ff642199994-7ff6421999a1 1985->1995 1986->1995 1987->1956 1996 7ff642199965-7ff642199967 1988->1996 1997 7ff642199957-7ff64219995d 1988->1997 1989->1956 1990->1989 1991->1947 1992->1947 1993->1981 1993->1982 1998 7ff6421997b0-7ff6421997ba 1994->1998 1999 7ff6421997cd-7ff6421997d0 1994->1999 1995->1978 1995->1979 1996->1978 2002 7ff642199969-7ff64219997d GetProcessHeap HeapFree 1996->2002 2000 7ff64219995f-7ff642199961 1997->2000 2001 7ff6421999b1-7ff642199a57 call 7ff6421a8a40 call 7ff642168b60 1997->2001 1998->1993 1998->1994 1999->1998 2004 7ff6421997d2-7ff6421997f3 GetProcessHeap HeapAlloc 1999->2004 2000->1978 2005 7ff642199963 2000->2005 2002->1978 2006 7ff642199880-7ff64219988d call 7ff642198ef0 2004->2006 2007 7ff6421997f9-7ff64219981a 2004->2007 2005->2002 2006->1984 2016 7ff64219988f-7ff642199892 2006->2016 2010 7ff642199820-7ff642199836 2007->2010 2010->2010 2013 7ff642199838-7ff642199844 2010->2013 2013->1956 2013->1993 2016->1984
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$FreeLibraryProcess$AddressAllocErrorInfoLoadProc
            • String ID: }0x$Errorcodemessage)HRESULT($RoOriginateError$called `Result::unwrap()` on an `Err` value$combase.dll
            • API String ID: 2127497604-686968424
            • Opcode ID: 98e497e5f1d13939fe1ff3b75019e8170162513a528eea5f429a0bfdd043751d
            • Instruction ID: 27bec8629d02dd498e10ac0fc983feaf4072fa1c85dfc3f1648336d53ac8aaa8
            • Opcode Fuzzy Hash: 98e497e5f1d13939fe1ff3b75019e8170162513a528eea5f429a0bfdd043751d
            • Instruction Fuzzy Hash: 1C12B062B0CB4282EB24BB15A44077A67A1FF84B98F244135DB4EC3B94DFBEE555CB04

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2017 7ff642199350-7ff64219935a 2018 7ff642199360-7ff64219936a 2017->2018 2019 7ff6421994d4 2017->2019 2021 7ff6421994de-7ff6421994e5 2018->2021 2022 7ff642199370-7ff642199394 GetProcessHeap HeapAlloc 2018->2022 2020 7ff6421994d6-7ff6421994dd 2019->2020 2023 7ff6421994f1-7ff642199597 call 7ff6421a8ee0 call 7ff6421691b0 2021->2023 2024 7ff6421994e7 2022->2024 2025 7ff64219939a-7ff6421993c2 2022->2025 2044 7ff642199661-7ff642199663 2023->2044 2045 7ff64219959d-7ff6421995e7 2023->2045 2024->2023 2027 7ff6421994ec call 7ff642198ef0 2024->2027 2026 7ff6421993f1-7ff6421993f5 2025->2026 2029 7ff6421993d3 2026->2029 2030 7ff6421993f7-7ff6421993fa 2026->2030 2027->2023 2034 7ff6421993d6-7ff6421993ee 2029->2034 2032 7ff642199400-7ff64219940b 2030->2032 2033 7ff6421994c6-7ff6421994d2 2030->2033 2036 7ff6421993d0 2032->2036 2037 7ff64219940d-7ff64219941f 2032->2037 2033->2020 2034->2026 2036->2029 2039 7ff642199421-7ff642199434 2037->2039 2040 7ff64219946d-7ff64219947b 2037->2040 2042 7ff642199480-7ff642199495 2039->2042 2043 7ff642199436-7ff642199458 2039->2043 2040->2029 2042->2029 2047 7ff64219949b-7ff6421994c1 2042->2047 2043->2033 2046 7ff64219945a-7ff642199465 2043->2046 2048 7ff642199685-7ff6421996c5 FormatMessageW 2044->2048 2053 7ff6421995fe-7ff642199606 2045->2053 2054 7ff6421995e9-7ff6421995f3 call 7ff642198ef0 2045->2054 2046->2029 2049 7ff64219946b 2046->2049 2047->2034 2051 7ff642199865-7ff642199868 2048->2051 2052 7ff6421996cb-7ff6421996d6 2048->2052 2049->2047 2055 7ff64219986a-7ff64219987e GetProcessHeap HeapFree 2051->2055 2056 7ff6421998bc-7ff6421998f3 call 7ff6421691b0 2051->2056 2057 7ff6421996f0-7ff6421996fb 2052->2057 2062 7ff64219960e-7ff642199614 2053->2062 2063 7ff642199608 SysFreeString 2053->2063 2054->2053 2072 7ff6421995f5-7ff6421995f8 2054->2072 2055->2056 2075 7ff6421998f5-7ff6421998f9 2056->2075 2076 7ff64219991d-7ff64219991f 2056->2076 2060 7ff6421996e0-7ff6421996ea 2057->2060 2061 7ff6421996fd-7ff642199700 2057->2061 2060->2057 2065 7ff642199860 2060->2065 2061->2060 2067 7ff642199702-7ff642199723 GetProcessHeap HeapAlloc 2061->2067 2068 7ff642199665-7ff64219966d 2062->2068 2069 7ff642199616-7ff64219961e 2062->2069 2063->2062 2065->2051 2077 7ff642199846-7ff642199853 call 7ff642198ef0 2067->2077 2078 7ff642199729-7ff64219974a 2067->2078 2073 7ff64219966f SysFreeString 2068->2073 2074 7ff642199675-7ff64219967d 2068->2074 2070 7ff642199624-7ff64219962c SysStringLen 2069->2070 2071 7ff642199779-7ff642199782 2069->2071 2070->2071 2080 7ff642199632-7ff64219963d 2070->2080 2081 7ff642199643-7ff642199648 2071->2081 2082 7ff642199788-7ff642199793 SysStringLen 2071->2082 2072->2053 2073->2074 2074->2048 2083 7ff64219967f SysFreeString 2074->2083 2084 7ff642199922-7ff64219992a 2075->2084 2085 7ff6421998fb-7ff642199904 2075->2085 2076->2084 2098 7ff64219985e 2077->2098 2099 7ff642199855-7ff642199858 2077->2099 2086 7ff642199750-7ff642199766 2078->2086 2080->2081 2080->2082 2090 7ff64219964e-7ff642199656 2081->2090 2091 7ff6421998ac-7ff6421998b4 2081->2091 2092 7ff642199799-7ff6421997a4 2082->2092 2093 7ff642199898 2082->2093 2083->2048 2087 7ff6421999a3-7ff6421999b0 2084->2087 2088 7ff64219992c-7ff642199938 2084->2088 2094 7ff64219997f-7ff64219998e 2085->2094 2095 7ff642199906-7ff64219991b 2085->2095 2086->2086 2096 7ff642199768-7ff642199774 2086->2096 2088->2087 2097 7ff64219993a-7ff642199955 2088->2097 2100 7ff6421998b6 SysFreeString 2090->2100 2101 7ff64219965c 2090->2101 2091->2056 2091->2100 2103 7ff6421997c0-7ff6421997cb 2092->2103 2102 7ff64219989a-7ff6421998a6 SysFreeString 2093->2102 2104 7ff642199994-7ff6421999a1 2094->2104 2095->2104 2096->2065 2105 7ff642199965-7ff642199967 2097->2105 2106 7ff642199957-7ff64219995d 2097->2106 2098->2065 2099->2098 2100->2056 2101->2056 2102->2090 2102->2091 2107 7ff6421997b0-7ff6421997ba 2103->2107 2108 7ff6421997cd-7ff6421997d0 2103->2108 2104->2087 2104->2088 2105->2087 2111 7ff642199969-7ff64219997d GetProcessHeap HeapFree 2105->2111 2109 7ff64219995f-7ff642199961 2106->2109 2110 7ff6421999b1-7ff642199a57 call 7ff6421a8a40 call 7ff642168b60 2106->2110 2107->2102 2107->2103 2108->2107 2113 7ff6421997d2-7ff6421997f3 GetProcessHeap HeapAlloc 2108->2113 2109->2087 2114 7ff642199963 2109->2114 2111->2087 2115 7ff642199880-7ff64219988d call 7ff642198ef0 2113->2115 2116 7ff6421997f9-7ff64219981a 2113->2116 2114->2111 2115->2093 2125 7ff64219988f-7ff642199892 2115->2125 2119 7ff642199820-7ff642199836 2116->2119 2119->2119 2122 7ff642199838-7ff642199844 2119->2122 2122->2065 2122->2102 2125->2093
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: HeapString$AllocFreeProcess
            • String ID: }0x$Errorcodemessage)HRESULT($called `Result::unwrap()` on an `Err` value
            • API String ID: 1311257442-1998358159
            • Opcode ID: 08d9abb574120299ed493830fccc2140d5510fdd1d51d38867470fc58d23e6a3
            • Instruction ID: b2396e49de277f33de4b4f8fad5f67c4321d9903905a84dca459fc5d84992f81
            • Opcode Fuzzy Hash: 08d9abb574120299ed493830fccc2140d5510fdd1d51d38867470fc58d23e6a3
            • Instruction Fuzzy Hash: 3CE1D572A1CB4282EB24BB15E44036A77A1EB84B98F244135DB8EC3B94DFBED555CB04

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2920 7ff642181a20-7ff642181ab1 call 7ff64217fe30 2923 7ff642181ab7-7ff642181ac0 2920->2923 2924 7ff642181b81-7ff642181ba6 GetFileInformationByHandle 2920->2924 2927 7ff642181ac6-7ff642181ac9 2923->2927 2928 7ff642181b71-7ff642181b7c 2923->2928 2925 7ff642181bac-7ff642181bb7 2924->2925 2926 7ff642181c58-7ff642181c6a GetLastError 2924->2926 2930 7ff642181bb9-7ff642181be1 GetFileInformationByHandleEx 2925->2930 2931 7ff642181bf8-7ff642181c56 2925->2931 2933 7ff642181c71-7ff642181c74 CloseHandle 2926->2933 2927->2928 2932 7ff642181acf-7ff642181ad7 2927->2932 2929 7ff642181c7a-7ff642181c8c 2928->2929 2930->2926 2934 7ff642181be3-7ff642181bf5 2930->2934 2931->2933 2935 7ff642181ad9-7ff642181adc 2932->2935 2936 7ff642181ae2-7ff642181b16 call 7ff64217a0b0 2932->2936 2933->2929 2934->2931 2935->2928 2935->2936 2939 7ff642181b18-7ff642181b4f call 7ff642180090 2936->2939 2940 7ff642181b55-7ff642181b59 2936->2940 2939->2940 2946 7ff642181c8d-7ff642181cb1 call 7ff64219b2c0 FindFirstFileW 2939->2946 2942 7ff642181b60-7ff642181b6c call 7ff642177de0 2940->2942 2942->2929 2949 7ff642181d25-7ff642181d30 2946->2949 2950 7ff642181cb3-7ff642181cc7 FindClose 2946->2950 2951 7ff642181d33-7ff642181d36 2949->2951 2952 7ff642181ccc-7ff642181cde 2950->2952 2953 7ff642181cc9 2950->2953 2956 7ff642181d4a-7ff642181d4d 2951->2956 2957 7ff642181d38-7ff642181d44 HeapFree 2951->2957 2954 7ff642181d12-7ff642181d17 2952->2954 2955 7ff642181ce0-7ff642181d10 2952->2955 2953->2952 2954->2955 2958 7ff642181d19-7ff642181d23 2954->2958 2955->2951 2956->2942 2959 7ff642181d53 2956->2959 2957->2956 2958->2949 2958->2955 2959->2929
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FileHandle$CloseFindInformation$ErrorFirstFreeHeapLast
            • String ID:
            • API String ID: 3677867274-0
            • Opcode ID: 131d586c77bb8e1225114036c5bfd5ecaa0b2a8adb6f2e2b8d9715770e3c5b16
            • Instruction ID: ed188c26f04da4153147bd74606d8abef6958d4a621bc2fa24e026ab354512b5
            • Opcode Fuzzy Hash: 131d586c77bb8e1225114036c5bfd5ecaa0b2a8adb6f2e2b8d9715770e3c5b16
            • Instruction Fuzzy Hash: A6917132A08B818AE730AF65E8843ED73B1FB44798F204125CF599BB94DFBDA585C740

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorFileObjectSingleStatusWaitWrite
            • String ID:
            • API String ID: 3447438843-0
            • Opcode ID: 6e6696027312d287b9f6ede1e74dd243036de0615eb17cc7ad88cf2b79c64b66
            • Instruction ID: 7932a4503c59579852cda4a58f8a824381a27baa2cc5ede97f575c97378d4fa5
            • Opcode Fuzzy Hash: 6e6696027312d287b9f6ede1e74dd243036de0615eb17cc7ad88cf2b79c64b66
            • Instruction Fuzzy Hash: 1F214332A1CB8182E710AB25F44035A67A5EBD5354F608235E79DC7BA4EFBDE1888F00

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2126 7ff642164f43-7ff642164f57 2127 7ff642164f5d-7ff642165394 FilterSendMessage 2126->2127 2128 7ff6421665f8-7ff6421669ba call 7ff6421a8ee0 * 3 call 7ff6421a8a40 call 7ff642161480 call 7ff642161c00 call 7ff64218f5a0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff6421a8970 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff6421a8970 call 7ff6421a8ee0 2126->2128 2136 7ff64216539a-7ff6421653b0 call 7ff64218f680 2127->2136 2137 7ff642166523-7ff642166574 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 2127->2137 2282 7ff6421669bc-7ff6421669c0 2128->2282 2283 7ff6421669c6-7ff642166a0d call 7ff6421a8a40 2128->2283 2144 7ff6421653b6-7ff6421653cd 2136->2144 2145 7ff642166499-7ff64216651e call 7ff6421a8970 call 7ff6421a8fa0 call 7ff6421a8970 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 2136->2145 2159 7ff642166579-7ff6421665aa call 7ff6421a8ee0 2137->2159 2148 7ff6421653f1-7ff64216541e 2144->2148 2145->2137 2152 7ff64216549f-7ff64216553d call 7ff642168fb0 call 7ff64217f980 2148->2152 2153 7ff6421653e0-7ff6421653eb 2148->2153 2152->2159 2188 7ff642165543-7ff6421656b8 call 7ff64219ac20 2152->2188 2153->2148 2153->2152 2165 7ff6421665af-7ff6421665f3 call 7ff6421a8ee0 call 7ff6421a8970 * 2 2159->2165 2165->2128 2200 7ff642165773-7ff64216577a 2188->2200 2201 7ff642165731-7ff642165762 2188->2201 2200->2201 2204 7ff64216577e-7ff6421657c6 call 7ff642167f90 2200->2204 2201->2200 2201->2204 2204->2165 2213 7ff6421657cc-7ff6421658a5 call 7ff64219ac20 2204->2213 2226 7ff64216636c-7ff642166387 call 7ff6421a8fa0 2213->2226 2227 7ff6421658ac call 7ff6421833f0 2213->2227 2233 7ff64216638d-7ff64216640f call 7ff642167790 call 7ff6421a8a40 2226->2233 2234 7ff642166411-7ff642166438 call 7ff6421a8970 call 7ff6421a8fa0 2226->2234 2227->2226 2233->2234 2234->2233 2248 7ff64216643e-7ff642166494 call 7ff6421a8970 call 7ff64216c090 call 7ff6421a8970 * 3 call 7ff6421a8c00 2234->2248 2248->2145 2282->2283 2285 7ff642166a12-7ff642166a48 call 7ff6421a8ee0 2283->2285 2288 7ff642166a4a-7ff642166a4d 2285->2288 2289 7ff642166a53-7ff642166cf8 call 7ff642167380 call 7ff6421a8910 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 2285->2289 2288->2289 2330 7ff642166cfa-7ff642166d07 HeapFree 2289->2330 2331 7ff642166d0d-7ff642166d34 2289->2331 2330->2331
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$Free$FilterMessageProcessSend
            • String ID: 145610$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value$global_key_idle disappearedC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\system.rs$lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs
            • API String ID: 3046406728-2085223163
            • Opcode ID: 3f2ab02d6b7665c73b554632a425a4f815591dd1feceb77e277ad0631b542e62
            • Instruction ID: 4fe13c57eaa3c3d7f15da39a244b66725b57d1e17c4bc79fa833a7e574946082
            • Opcode Fuzzy Hash: 3f2ab02d6b7665c73b554632a425a4f815591dd1feceb77e277ad0631b542e62
            • Instruction Fuzzy Hash: 52620C72A0DA8695E720BF60D8403EE2365FB4474CF604136DA4DC7A99DFBEE649C780

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2332 7ff6421918c0-7ff6421918fc 2333 7ff642191902-7ff64219191f 2332->2333 2334 7ff642191eea-7ff642191f6c call 7ff642178ac0 2332->2334 2336 7ff642191f74-7ff642191fb8 call 7ff642178ac0 2333->2336 2337 7ff642191925-7ff64219198f AcquireSRWLockShared 2333->2337 2343 7ff642191f6e-7ff642191f72 2334->2343 2344 7ff642191fc2-7ff642191ff1 2334->2344 2336->2344 2345 7ff642191fba 2336->2345 2339 7ff642191991-7ff642191998 call 7ff642192390 2337->2339 2340 7ff6421919b6-7ff6421919dd 2337->2340 2350 7ff64219199a-7ff6421919ab 2339->2350 2354 7ff6421919e2-7ff642191a0c ReleaseSRWLockShared 2340->2354 2349 7ff642191fbd call 7ff642177de0 2343->2349 2347 7ff642191ffe-7ff642192010 2344->2347 2348 7ff642191ff3-7ff642191ff7 2344->2348 2345->2349 2348->2347 2355 7ff642191ff9 call 7ff64216c0b0 2348->2355 2349->2344 2351 7ff642191a1c-7ff642191a37 2350->2351 2352 7ff6421919ad-7ff6421919b1 2350->2352 2357 7ff642191aa7-7ff642191ab2 2351->2357 2358 7ff642191a39-7ff642191a3d 2351->2358 2356 7ff642191bdb-7ff642191c09 2352->2356 2360 7ff642191a0e-7ff642191a17 call 7ff642182b60 2354->2360 2361 7ff642191a42-7ff642191a95 call 7ff642168b60 2354->2361 2355->2347 2370 7ff642191cef-7ff642191d19 2356->2370 2371 7ff642191c0f-7ff642191c3c call 7ff6421786c0 2356->2371 2364 7ff642191b47-7ff642191b63 call 7ff6421a8c00 2357->2364 2365 7ff642191ab8-7ff642191ac3 2357->2365 2358->2356 2375 7ff642191eab 2360->2375 2373 7ff642191b02-7ff642191b05 2361->2373 2374 7ff642191a97-7ff642191aa5 2361->2374 2364->2375 2377 7ff642191bcb-7ff642191bd7 2364->2377 2365->2373 2392 7ff642191d2e-7ff642191d33 2370->2392 2393 7ff642191d1b-7ff642191d26 2370->2393 2387 7ff642191c3e-7ff642191c45 2371->2387 2388 7ff642191c51-7ff642191c86 2371->2388 2380 7ff642191b14 2373->2380 2381 7ff642191b07-7ff642191b0f call 7ff642177de0 2373->2381 2379 7ff642191b16-7ff642191b33 call 7ff642177ee0 2374->2379 2378 7ff642191ead-7ff642191eb4 2375->2378 2377->2356 2385 7ff642191eb8-7ff642191ec4 2378->2385 2379->2377 2380->2379 2381->2380 2390 7ff642191d88-7ff642191d8b 2385->2390 2391 7ff642191eca-7ff642191ece 2385->2391 2387->2388 2394 7ff642191c47-7ff642191c4e 2387->2394 2395 7ff642191d55-7ff642191d84 call 7ff642190e70 2388->2395 2396 7ff642191c8c-7ff642191cae 2388->2396 2398 7ff642191d9b-7ff642191da4 2390->2398 2399 7ff642191d8d-7ff642191d91 2390->2399 2391->2390 2397 7ff642191ed4-7ff642191ed9 call 7ff64216d0e0 2391->2397 2403 7ff642191d3f 2392->2403 2393->2392 2394->2388 2395->2390 2396->2403 2404 7ff642191cb4-7ff642191cbc call 7ff642182820 2396->2404 2397->2390 2398->2354 2402 7ff642191daa-7ff642191dae 2398->2402 2399->2398 2400 7ff642191d93-7ff642191d96 call 7ff64216c0b0 2399->2400 2400->2398 2402->2354 2409 7ff642191db4-7ff642191dbc call 7ff64216d0e0 2402->2409 2406 7ff642191d46-7ff642191d53 2403->2406 2404->2406 2418 7ff642191cc2-7ff642191cea call 7ff6421a8ee0 2404->2418 2406->2395 2412 7ff642191dc1-7ff642191ddf AcquireSRWLockExclusive 2406->2412 2409->2354 2415 7ff642191ede-7ff642191ee5 2412->2415 2416 7ff642191de5-7ff642191dec call 7ff6421aaf80 2412->2416 2420 7ff642191def-7ff642191e13 call 7ff642190e70 2415->2420 2416->2420 2418->2375 2426 7ff642191e31-7ff642191e5d ReleaseSRWLockExclusive 2420->2426 2427 7ff642191e15-7ff642191e22 2420->2427 2426->2378 2428 7ff642191e5f-7ff642191e6f call 7ff642182820 2426->2428 2427->2426 2429 7ff642191e24-7ff642191e2b call 7ff6421aaf80 2427->2429 2428->2385 2434 7ff642191e71-7ff642191e75 2428->2434 2429->2426 2435 7ff642191e2d 2429->2435 2436 7ff642191e7f-7ff642191ea1 2434->2436 2437 7ff642191e77-7ff642191e7a call 7ff64216d0e0 2434->2437 2435->2426 2436->2375 2439 7ff642191ea6 call 7ff6421a8ee0 2436->2439 2437->2436 2439->2375
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Lock$ReleaseShared$AcquireExclusive
            • String ID: Box<dyn Any><unnamed>$called `Result::unwrap()` on an `Err` value$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs
            • API String ID: 546267457-360994743
            • Opcode ID: 81dfeab94eec2f96bf98bfde626f658734753c734c5588812ee3a0919804d8c5
            • Instruction ID: 4142bdb495c84306b99eee8453639a13172629732d1746f25a2b61fad5d79ecd
            • Opcode Fuzzy Hash: 81dfeab94eec2f96bf98bfde626f658734753c734c5588812ee3a0919804d8c5
            • Instruction Fuzzy Hash: 87123726A0CB8188EB11EF65D8403A837A4FB5874CF644136EB4DC3B95DFBAE555CB40
            APIs
            • FilterConnectCommunicationPort.FLTLIB ref: 00007FF642164DF8
              • Part of subcall function 00007FF64218F680: GetProcessHeap.KERNEL32(?,?,?,?,00007FF64217875D,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218F697
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CommunicationConnectFilterHeapPortProcess
            • String ID: 145610$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value$global_key_idle disappearedC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\system.rs$lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs
            • API String ID: 3599910821-2085223163
            • Opcode ID: 65b88fe088880b4e7db76aa20ddc03aefaf02c9b11c1117b7e81dabafe6f8d84
            • Instruction ID: c6dd244d4a2c3123ab8f262776fb4758b6bf579ae7a58dce581ef5127ab2559a
            • Opcode Fuzzy Hash: 65b88fe088880b4e7db76aa20ddc03aefaf02c9b11c1117b7e81dabafe6f8d84
            • Instruction Fuzzy Hash: 1A52EA72A0CA8695E720BF60D8403EE2365FB4574CF604136DA4DC7A99DFBEE649C780

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2872 7ff64217fe30-7ff64217fe6b call 7ff64217a0b0 2875 7ff64217fe6d-7ff64217fe72 2872->2875 2876 7ff64217fe77-7ff64217feaf call 7ff642180090 2872->2876 2877 7ff642180041-7ff642180058 2875->2877 2880 7ff64217feb9-7ff64217fec3 2876->2880 2881 7ff64217feb1-7ff64217feb4 2876->2881 2882 7ff64217fec5-7ff64217fec7 2880->2882 2883 7ff64217fecf-7ff64217fed1 2880->2883 2881->2877 2884 7ff64217fec9-7ff64217fecd 2882->2884 2885 7ff64217fed3-7ff64217fedb 2882->2885 2883->2885 2886 7ff64217fef9-7ff64217fefd 2883->2886 2887 7ff64217ff0d-7ff64217ff11 2884->2887 2885->2887 2888 7ff64217fedd-7ff64217fedf 2885->2888 2889 7ff64217fee1-7ff64217feee 2886->2889 2890 7ff64217feff-7ff64217ff03 2886->2890 2891 7ff64217ff23-7ff64217ff25 2887->2891 2892 7ff64217ff13-7ff64217ff15 2887->2892 2888->2887 2888->2889 2893 7ff64217fef4 2889->2893 2894 7ff64218002f-7ff64218003b HeapFree 2889->2894 2890->2889 2895 7ff64217ff05-7ff64217ff09 2890->2895 2897 7ff64217ff27-7ff64217ff2f 2891->2897 2899 7ff64217ff36-7ff64217ff46 2891->2899 2892->2897 2898 7ff64217ff17-7ff64217ff1f 2892->2898 2893->2877 2894->2877 2895->2889 2896 7ff64217ff0b 2895->2896 2896->2887 2900 7ff64217ff31-7ff64217ff34 2897->2900 2902 7ff64217ff48-7ff64217ff4c 2897->2902 2898->2900 2901 7ff64217ff21 2898->2901 2899->2900 2899->2902 2903 7ff64217ff88-7ff64217ffc8 CreateFileW 2900->2903 2901->2902 2904 7ff64217ff6c-7ff64217ff6e 2902->2904 2905 7ff64217ff4e-7ff64217ff6a 2902->2905 2906 7ff64217ffca-7ff64217ffd0 2903->2906 2907 7ff642180014-7ff64218002d GetLastError 2903->2907 2908 7ff64217ff7b-7ff64217ff7d 2904->2908 2909 7ff64217ff70-7ff64217ff72 2904->2909 2905->2903 2910 7ff64218000b-7ff642180010 2906->2910 2911 7ff64217ffd2-7ff64217ffd6 2906->2911 2907->2877 2907->2894 2908->2889 2913 7ff64217ff83 2908->2913 2912 7ff64217ff74-7ff64217ff79 2909->2912 2909->2913 2910->2894 2915 7ff642180012 2910->2915 2911->2910 2914 7ff64217ffd8-7ff64217ffe3 GetLastError 2911->2914 2912->2903 2913->2903 2914->2910 2916 7ff64217ffe5-7ff642180009 SetFileInformationByHandle 2914->2916 2915->2877 2916->2910 2917 7ff642180059-7ff642180075 GetLastError CloseHandle 2916->2917 2918 7ff642180089-7ff64218008c 2917->2918 2919 7ff642180077-7ff642180083 HeapFree 2917->2919 2918->2877 2919->2918
            APIs
              • Part of subcall function 00007FF64217A0B0: HeapFree.KERNEL32 ref: 00007FF64217A1D9
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00000027,00000000,00007FF642181AAB), ref: 00007FF642180059
            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00000027,00000000,00007FF642181AAB), ref: 00007FF64218006C
            • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00000027,00000000,00007FF642181AAB), ref: 00007FF642180083
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap$CloseErrorHandleLast
            • String ID:
            • API String ID: 1415190448-0
            • Opcode ID: a7f0dbad2ec9ad85bf35a265f88f452913831b2c75793260959fb231b088f851
            • Instruction ID: aa08fae4c6817215c79f4cf8d76e36c2fe15d04ccd86177bff8b15ba96491459
            • Opcode Fuzzy Hash: a7f0dbad2ec9ad85bf35a265f88f452913831b2c75793260959fb231b088f851
            • Instruction Fuzzy Hash: C961806290C64646F761BB21E54037A2B90AB85B9CF350131DF9DC72D5CEFFE8898B10

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorExceptionFreeGuaranteeHandlerHeapLastStackThreadVectored
            • String ID: called `Result::unwrap()` on an `Err` value$main
            • API String ID: 1211994890-1038248105
            • Opcode ID: 9a6b89ae3dcf06dd0bfbf8a5f2641cd9ce85379903b15beb51b794557082b364
            • Instruction ID: ed7d24d7e622ce766e19848e3b60dbbcbf7ba5aabbe1287e573a24597402a2e0
            • Opcode Fuzzy Hash: 9a6b89ae3dcf06dd0bfbf8a5f2641cd9ce85379903b15beb51b794557082b364
            • Instruction Fuzzy Hash: 1C512971E0CA4289FB50BBA0D8803AD2375BB4431CF654139CA4DD7795DFBE914ACB40

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2993 7ff64216577c 2994 7ff64216578f-7ff6421657c6 call 7ff642167f90 2993->2994 2995 7ff64216575e-7ff642165762 2993->2995 3001 7ff6421657cc-7ff6421658a5 call 7ff64219ac20 2994->3001 3002 7ff6421665af-7ff6421669ba call 7ff6421a8ee0 call 7ff6421a8970 * 2 call 7ff6421a8ee0 * 3 call 7ff6421a8a40 call 7ff642161480 call 7ff642161c00 call 7ff64218f5a0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff6421a8970 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff6421a8970 call 7ff6421a8ee0 2994->3002 2996 7ff642165773-7ff64216577a 2995->2996 2997 7ff64216577e-7ff64216578b 2995->2997 2996->2997 2999 7ff642165731-7ff64216575b 2996->2999 2997->2994 2999->2995 3015 7ff64216636c-7ff642166387 call 7ff6421a8fa0 3001->3015 3016 7ff6421658ac call 7ff6421833f0 3001->3016 3125 7ff6421669bc-7ff6421669c0 3002->3125 3126 7ff6421669c6-7ff642166a0d call 7ff6421a8a40 3002->3126 3022 7ff64216638d-7ff64216640f call 7ff642167790 call 7ff6421a8a40 3015->3022 3023 7ff642166411-7ff642166438 call 7ff6421a8970 call 7ff6421a8fa0 3015->3023 3016->3015 3022->3023 3023->3022 3037 7ff64216643e-7ff6421665aa call 7ff6421a8970 call 7ff64216c090 call 7ff6421a8970 * 3 call 7ff6421a8c00 call 7ff6421a8970 call 7ff6421a8fa0 call 7ff6421a8970 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 * 2 3023->3037 3037->3002 3125->3126 3128 7ff642166a12-7ff642166a48 call 7ff6421a8ee0 3126->3128 3131 7ff642166a4a-7ff642166a4d 3128->3131 3132 7ff642166a53-7ff642166cf8 call 7ff642167380 call 7ff6421a8910 call 7ff642199d20 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 call 7ff642198ef0 call 7ff642167380 call 7ff6421a8ee0 3128->3132 3131->3132 3173 7ff642166cfa-7ff642166d07 HeapFree 3132->3173 3174 7ff642166d0d-7ff642166d34 3132->3174 3173->3174
            APIs
              • Part of subcall function 00007FF64218F680: GetProcessHeap.KERNEL32(?,?,?,?,00007FF64217875D,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218F697
              • Part of subcall function 00007FF642161480: HeapFree.KERNEL32 ref: 00007FF6421614CC
              • Part of subcall function 00007FF642199D20: GetLastError.KERNEL32 ref: 00007FF642199D24
              • Part of subcall function 00007FF642198EF0: GetErrorInfo.OLEAUT32 ref: 00007FF642198F0F
              • Part of subcall function 00007FF642198EF0: GetErrorInfo.OLEAUT32 ref: 00007FF642198FFD
              • Part of subcall function 00007FF642198EF0: SysStringLen.OLEAUT32 ref: 00007FF642199049
              • Part of subcall function 00007FF642198EF0: GetProcessHeap.KERNEL32 ref: 00007FF642199064
              • Part of subcall function 00007FF642198EF0: HeapAlloc.KERNEL32 ref: 00007FF642199072
              • Part of subcall function 00007FF642198EF0: SysFreeString.OLEAUT32 ref: 00007FF64219919B
            • HeapFree.KERNEL32 ref: 00007FF642166D07
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$ErrorFree$InfoProcessString$AllocLast
            • String ID: 145610$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value
            • API String ID: 133633711-381371676
            • Opcode ID: f5b106cf2a1308dd29e68abda0936052e3e548c0e50c9b3ad663377f214895bc
            • Instruction ID: 69677ed94e7ac2baaf3cb7be7d5af5409948182d2b8e90b87e6104bf99234eb9
            • Opcode Fuzzy Hash: f5b106cf2a1308dd29e68abda0936052e3e548c0e50c9b3ad663377f214895bc
            • Instruction Fuzzy Hash: 8B32FB76A0CA8695E720BF60D8402EE3360FB4574CF604136DA4DD7A99DFBEE249C780

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
            • String ID:
            • API String ID: 3058843127-0
            • Opcode ID: e9faee2332b3457ff8982de28b3003911c84832c8064e044ef79c5e00c5d3bc0
            • Instruction ID: 50c3a683ce641cab1d3a71a045e70f1e6c687c2a277bccbd66f1a7ed923679ee
            • Opcode Fuzzy Hash: e9faee2332b3457ff8982de28b3003911c84832c8064e044ef79c5e00c5d3bc0
            • Instruction Fuzzy Hash: C9314C21E0C646C2FA54BB25D4563BA2391AF4578CF744036EB4DC72D7DEAFA829CE01

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeapThread$CurrentDescription
            • String ID:
            • API String ID: 2762239883-0
            • Opcode ID: a98f9c6e6697a82a4b15ead7c47c61c3221afefeacadb6e9cd2eb99eec15f024
            • Instruction ID: c7b310c749cb117900f4a0c1447f55bf65178160d371b590b78c3149312b327c
            • Opcode Fuzzy Hash: a98f9c6e6697a82a4b15ead7c47c61c3221afefeacadb6e9cd2eb99eec15f024
            • Instruction Fuzzy Hash: C0017565A0C94681FA50BB12E5043ADA761EFC9FD8F704132DB0DD3768DEAED5868F00

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 3259 7ff6421917c0-7ff6421917e1 3260 7ff6421917e3-7ff6421917e6 3259->3260 3261 7ff6421917f8-7ff6421917fb 3259->3261 3262 7ff6421917e8-7ff6421917eb 3260->3262 3263 7ff64219183b-7ff642191874 call 7ff6421918c0 3260->3263 3261->3263 3264 7ff6421917fd-7ff642191803 3261->3264 3262->3263 3265 7ff6421917ed-7ff6421917f6 3262->3265 3269 7ff642191879-7ff642191898 3263->3269 3266 7ff642191807-7ff642191836 call 7ff6421918c0 3264->3266 3265->3266 3266->3263 3270 7ff6421918a0-7ff6421918b9 HeapFree 3269->3270 3271 7ff64219189a-7ff64219189f 3269->3271
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 3298025750-2333694755
            • Opcode ID: 7201e2280700015d82bf009124e593497983b411f3b19c975f01b453e050a7f8
            • Instruction ID: c5e36f0d1b22f9c5bd178d31189e4f1d2ad38449bbb3c37e32bead7af8b61a3c
            • Opcode Fuzzy Hash: 7201e2280700015d82bf009124e593497983b411f3b19c975f01b453e050a7f8
            • Instruction Fuzzy Hash: 9E31C7B6A08F85C9EB14AB65D0401AC7BB0F759B98F684136CF9C837A4CF69C196CB10

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 3272 7ff642180820-7ff64218087b call 7ff64217fe30 3275 7ff64218087d-7ff642180880 3272->3275 3276 7ff642180885-7ff6421808a4 3272->3276 3277 7ff642180960-7ff642180973 3275->3277 3278 7ff6421808d0-7ff6421808d9 call 7ff642179610 3276->3278 3280 7ff6421808de-7ff6421808e3 3278->3280 3281 7ff6421808e5-7ff64218094a 3280->3281 3282 7ff642180910-7ff642180917 3280->3282 3285 7ff642180956-7ff64218095a CloseHandle 3281->3285 3290 7ff64218094c-7ff642180950 3281->3290 3283 7ff642180979-7ff64218097c 3282->3283 3284 7ff642180919-7ff64218091f 3282->3284 3283->3285 3287 7ff642180921-7ff64218092e 3284->3287 3288 7ff64218097e-7ff6421809c4 call 7ff6421a8a80 CloseHandle 3284->3288 3285->3277 3287->3278 3291 7ff642180930 3287->3291 3290->3285 3294 7ff6421808bb-7ff6421808ca call 7ff642177de0 3290->3294 3291->3285 3292 7ff642180974-7ff642180977 3291->3292 3292->3285 3294->3278 3294->3292
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f4d8d23534c16888d49047372829197132799ac259f3a3025ea5a725db84141e
            • Instruction ID: a8583ddd91757110e46d7a73be2425131f554f3fd8b82e06e1fa6819ae4c8941
            • Opcode Fuzzy Hash: f4d8d23534c16888d49047372829197132799ac259f3a3025ea5a725db84141e
            • Instruction Fuzzy Hash: C5319E22F1CA49A8F701EBA2A9447AD2770BB557ACF244531DF0C93794CFBDA186CB10

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: 58fe9d01bc89c1d0c41b0dd22792b8730bb3802ccff8dd231fdc11e37bc72971
            • Instruction ID: c4fc0998bac141e05d3b4d8d5cd51c8c718046dfc1db04bc71c511760ffcd14d
            • Opcode Fuzzy Hash: 58fe9d01bc89c1d0c41b0dd22792b8730bb3802ccff8dd231fdc11e37bc72971
            • Instruction Fuzzy Hash: CB116A72A1C64282F310BF25A4601B963A4FF84748F660535E78DC7692EFBEE8158F40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CloseHandle
            • String ID:
            • API String ID: 2962429428-0
            • Opcode ID: 7b4fe7b788bcb3605861fe087f68e93ee33eb30ee68045489da57a07c4924fb4
            • Instruction ID: e3859b3ae5cb6cf7be6cfc506d254b73e1e1b767dec95a736a5f049768be9b29
            • Opcode Fuzzy Hash: 7b4fe7b788bcb3605861fe087f68e93ee33eb30ee68045489da57a07c4924fb4
            • Instruction Fuzzy Hash: ECF06D23F1CA0945FA12BB55A8853785260AB44BECF140432CF0CD3794CEBEE0C68610
            APIs
            • HeapAlloc.KERNEL32(?,?,00000000,00007FF64219FC5E,?,?,?,00007FF64219DFF2,?,?,?,00007FF6421ACBD6), ref: 00007FF6421A0319
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: b8e3dd6c845d3c96298b05e338b2734fe6e0b663cf81a541b70429510d951669
            • Instruction ID: 2dc949ca1fe2d3a97a6192f00d4e8ed2ab326e331f7f5fede62ea65b294365d0
            • Opcode Fuzzy Hash: b8e3dd6c845d3c96298b05e338b2734fe6e0b663cf81a541b70429510d951669
            • Instruction Fuzzy Hash: 8BF06244B0D60386FF547A6295503B642801F98B88F6C5431CF0DC73D1EEAEE488C911
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CloseHandle$FileObjectSingleWaitWrite
            • String ID:
            • API String ID: 1197516534-0
            • Opcode ID: 6a76c7b5fb9db5445bf12b57375e8c9cd81899525f051759071d190849ecf108
            • Instruction ID: 64f9054aa8bb4cc02d2bc17fc41c6a2c0e68903f1294af4557a3cfcf8310a522
            • Opcode Fuzzy Hash: 6a76c7b5fb9db5445bf12b57375e8c9cd81899525f051759071d190849ecf108
            • Instruction Fuzzy Hash: B8F04923F18A0485FB02BB65E9813792260BB44BACF140536DF0DC3795CFB9A186C610
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID: .exeprogram not found$PATHRUST_MIN_STACKfatal runtime error: assertion failed: thread_info.stack_guard.get().is_none() && thread_info.thread.get().is_none()$\?\\$]?\\$internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs
            • API String ID: 3298025750-2542956801
            • Opcode ID: 69dbbc9a06151c27e25d63da7a012765fd4adfceb4b767906ac0218de55de25d
            • Instruction ID: c01a8c363671f8f295ee4e3545516a096dde03ff0772593a9bdce39f01ff594d
            • Opcode Fuzzy Hash: 69dbbc9a06151c27e25d63da7a012765fd4adfceb4b767906ac0218de55de25d
            • Instruction Fuzzy Hash: D6135062A0CAC188E770AF21DC903F927A1FB4578DF644135CB4DDBB99DFBA96458B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Process$MemoryRead$FreeHeapInformationQuery
            • String ID:
            • API String ID: 2913393175-0
            • Opcode ID: e9d243cf93951d3e7faef81c730f9fff8a640867268e7d641ee9fd4fabe15be4
            • Instruction ID: 64f7d0d1c5a5b4ddb2bd7f8bb5d15cacd5532f171c407af8e3a2f9aea63bf184
            • Opcode Fuzzy Hash: e9d243cf93951d3e7faef81c730f9fff8a640867268e7d641ee9fd4fabe15be4
            • Instruction Fuzzy Hash: 72C26062A0CBC2C1E764BB26A4403AA67A0FF45B88F644135DB9DC3794DFBEE455CB10
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressErrorLastProc$Current$FreeHeapMutexProcess$CaptureCloseContextCreateDirectoryEntryFunctionHandleLibraryLoadLookupObjectReleaseSingleWait
            • String ID: SymAddrIncludeInlineTrace$SymGetOptions$SymInitializeW$SymSetOptions$called `Result::unwrap()` on an `Err` value$dbghelp.dll$internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs
            • API String ID: 2343345281-2399127840
            • Opcode ID: d6b844103cd9f449027a4133aa8275687497e50c8e799564a43332bc9e41834d
            • Instruction ID: f61c83280be36dd2a4adb423173ae6e58f0aede7cc6a01b482498f51a1b78a6f
            • Opcode Fuzzy Hash: d6b844103cd9f449027a4133aa8275687497e50c8e799564a43332bc9e41834d
            • Instruction Fuzzy Hash: C2322C22A09EC288E771AF25DC403EA27A0FB4575DF644135CA4DC7795EFBA9645CB00
            Strings
            • internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs, xrefs: 00007FF64218D9D7, 00007FF64218DF02
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs
            • API String ID: 0-4032025951
            • Opcode ID: 05472ade864a3d7f6dee9db3e666f7149231404a873a8ba34d1dca8e243bcee6
            • Instruction ID: d145d86f68f9877a091c0c905961e0626effa3fc8d359ce9da91e355e300d55b
            • Opcode Fuzzy Hash: 05472ade864a3d7f6dee9db3e666f7149231404a873a8ba34d1dca8e243bcee6
            • Instruction Fuzzy Hash: BB426962A0CBC285E761BF21D8847E923A5FB04B9CF644136CB5CDB794DFBA9685C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressProc$CurrentProcess
            • String ID: ($($SymAddrIncludeInlineTrace$SymFromAddrW$SymFromInlineContextW$SymGetLineFromAddrW64$SymGetLineFromInlineContextW$SymQueryInlineTrace$X$X
            • API String ID: 2190909847-3202392857
            • Opcode ID: 243d776034013141ea8f45342857c8998eda0f599b91f83979ff7a201731be2a
            • Instruction ID: c0908673b75cfb52f026dedd0ac3cb0cbb82655c2bf277a31668bdd3f9fcdcc4
            • Opcode Fuzzy Hash: 243d776034013141ea8f45342857c8998eda0f599b91f83979ff7a201731be2a
            • Instruction Fuzzy Hash: E9629D21A0CAC681E766BB14E4453FA67A0FBC4798F204136EB89C3794EFBED545CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$Free$InfoProcessSystem
            • String ID: 0$called `Result::unwrap()` on an `Err` value$unknownARM x64C:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\cpu.rs
            • API String ID: 3043813636-518316965
            • Opcode ID: 04ad6df6f7dcb11f5da510ae24e900c09e69ae279736cdda98a8d3d642827188
            • Instruction ID: 40020a82c798fe0e78dda023f61fd56fcb22f964fb89c992a63ca0b7491cf98d
            • Opcode Fuzzy Hash: 04ad6df6f7dcb11f5da510ae24e900c09e69ae279736cdda98a8d3d642827188
            • Instruction Fuzzy Hash: 9832A121A0CBC181E760BB15A4443BAA7A1FF88788F644135DB8DC77A5DFBEE595CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorLast$FullNamePath
            • String ID: \\?\\\?\UNC\$called `Result::unwrap()` on an `Err` value$internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs
            • API String ID: 2482867836-3315185550
            • Opcode ID: a6eae6b535bd449e38227622cce01ce4aff8c2edc6ba97dd28d84f664c5b5455
            • Instruction ID: 10912355215c731aa691739b195ddb484d02057441993fa1a0bbf18023d50b9a
            • Opcode Fuzzy Hash: a6eae6b535bd449e38227622cce01ce4aff8c2edc6ba97dd28d84f664c5b5455
            • Instruction Fuzzy Hash: 2712D062A0CB8A85E770BF1198843F923A5FB04B9CF614036CB5DC7794CFBAD6858760
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CryptCurrentFreeHeapProcessRandom
            • String ID:
            • API String ID: 1323412823-0
            • Opcode ID: f3fb4a6efcd70b2634ac480b40fc310e37437d5a4da0368c7cc17890ca0c74ed
            • Instruction ID: 09b4cf9faa5c7fdb0258ac45bc9d15ce9012fc24377f005a648ec7ef08b9de55
            • Opcode Fuzzy Hash: f3fb4a6efcd70b2634ac480b40fc310e37437d5a4da0368c7cc17890ca0c74ed
            • Instruction Fuzzy Hash: D4229132A0CAD189E764AF25D8403EA2BA0FB4479CF244235DB5DC7BD9DFBAD5498700
            APIs
            • InitializeProcThreadAttributeList.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,?,?,?,?,00007FF642186993), ref: 00007FF64218B5F7
            • HeapReAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,?,?,?,?,00007FF642186993), ref: 00007FF64218B67A
            • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218B9AB
              • Part of subcall function 00007FF64218F680: GetProcessHeap.KERNEL32(?,?,?,?,00007FF64217875D,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218F697
            • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,?,?,?,?,00007FF642186993), ref: 00007FF64218B6A6
            • InitializeProcThreadAttributeList.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,?,?,?,?,00007FF642186993), ref: 00007FF64218B6BE
            • UpdateProcThreadAttribute.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000002,?,?,?,?,00007FF642186993), ref: 00007FF64218B72A
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$AttributeProcThread$FreeInitializeList$AllocProcessUpdate
            • String ID:
            • API String ID: 2216397699-0
            • Opcode ID: e7905442ef40a86482efce3f2cfaba0b2dc89279905c95cb6bbeb1a5ef79aab9
            • Instruction ID: 3784533030beb8108b465552543cc85d6c46be9dd2c76183519f00f31bcc5132
            • Opcode Fuzzy Hash: e7905442ef40a86482efce3f2cfaba0b2dc89279905c95cb6bbeb1a5ef79aab9
            • Instruction Fuzzy Hash: ABA1C762E1DA5181EB147B169880BB923A0BF49BACF744231DF6DC73D0DE7EE1468B00
            APIs
            Strings
            • NTDLL.DLL, xrefs: 00007FF64217AD1C
            • assertion failed: self.is_char_boundary(new_len)/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\alloc\src\string.rs, xrefs: 00007FF64217B2FC
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FormatHandleMessageModule
            • String ID: NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\alloc\src\string.rs
            • API String ID: 2046974992-908490256
            • Opcode ID: 980187b29f222008639c132e09c1e5e011a18efb8b8c27df43949b506cd94c6f
            • Instruction ID: 244965186530f4da76a945c22a9ba79b29b50d4f0d7afc05af0f21571a6a92fa
            • Opcode Fuzzy Hash: 980187b29f222008639c132e09c1e5e011a18efb8b8c27df43949b506cd94c6f
            • Instruction Fuzzy Hash: 9EF18022A0DAC249E731BF25D804BFD2660FB8479CF544136DB8DCBB98DFB992859700
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dc1117908b30af910fa354c5afa37b13eaffa65144e276ff698f216482155e12
            • Instruction ID: 721b1b5a0cb9121399ad87f99b45d67a26e3af7962abd3bf12711a7d55ca0ed9
            • Opcode Fuzzy Hash: dc1117908b30af910fa354c5afa37b13eaffa65144e276ff698f216482155e12
            • Instruction Fuzzy Hash: 2C12E262A1CB8185E760BB25A40037AA7A0FB84BD8F254236DF8ED7794DFBDD455CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
            • String ID:
            • API String ID: 3140674995-0
            • Opcode ID: 743d7e6e6fa98b6cccb623df80daaa8ae3b06a8d5d668ebac542380efbae9884
            • Instruction ID: 5bfca10035d78df4a66be25281b7d88628a720407d83ad4a1027d77eb085f85e
            • Opcode Fuzzy Hash: 743d7e6e6fa98b6cccb623df80daaa8ae3b06a8d5d668ebac542380efbae9884
            • Instruction Fuzzy Hash: 80316F72608B8189EB64AF60E8503EE7360FB84748F54443ADB4DC7A94DFB9D64CCB10
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 66494ca9b243dc1705976b68b96848ef2e3cd415046dbffdd71f16e5fecea5cc
            • Instruction ID: a0c5fb5c7513c51618715616a3a2e183f2941574768c3e716f653a2493f46839
            • Opcode Fuzzy Hash: 66494ca9b243dc1705976b68b96848ef2e3cd415046dbffdd71f16e5fecea5cc
            • Instruction Fuzzy Hash: AF42C772A0DA8581EB64BB55D1403B963A1FB48798F248136CF9DC7394DFBEE489CB40
            Strings
            • stdoutlibrary\std\src\io\mod.rsadvancing io slices beyond their length, xrefs: 00007FF6421647B2
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: InfoSystem
            • String ID: stdoutlibrary\std\src\io\mod.rsadvancing io slices beyond their length
            • API String ID: 31276548-3145101877
            • Opcode ID: 457e897808cf76c46725366a11ac404015ebf01944043c86ab7d185b97d42b68
            • Instruction ID: 29104715bb37c6d33a2af24dc1755e3dfc67e544b143be7c4fb94bab3ca2325d
            • Opcode Fuzzy Hash: 457e897808cf76c46725366a11ac404015ebf01944043c86ab7d185b97d42b68
            • Instruction Fuzzy Hash: C4528D36A0DBC185E731AF29D8407EC63A4FB55B88F545236CB4C9BB95EF79A680C340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
            • String ID:
            • API String ID: 1239891234-0
            • Opcode ID: 2b3865fb88aacf5ea44c591d7fce5a17684136ff4545db75505cd226e3b7d946
            • Instruction ID: 5bff38b332f33c53443aaedb7f240a619094542974370e3cb34180fe83c50e6d
            • Opcode Fuzzy Hash: 2b3865fb88aacf5ea44c591d7fce5a17684136ff4545db75505cd226e3b7d946
            • Instruction Fuzzy Hash: 75317F36608F8195D760EF25E8402AE33A4FB85758F600136EB9DC3B98DFB9D559CB00
            APIs
            Strings
            • assertion failed: idx < CAPACITY/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\alloc\src\collections\btree\node.rsassertion failed: edge.height == self.height - 1, xrefs: 00007FF6421899B2
            • assertion failed: edge.height == self.node.height - 1, xrefs: 00007FF642189845
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap$CompareOrdinalString
            • String ID: assertion failed: edge.height == self.node.height - 1$assertion failed: idx < CAPACITY/rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04\library\alloc\src\collections\btree\node.rsassertion failed: edge.height == self.height - 1
            • API String ID: 3984308579-1420224799
            • Opcode ID: 8a4a9184571c56d5fbdeeed28bac1d6b598962224e41b7f47917af0494116bf4
            • Instruction ID: 98a0cae19cb818cf61f0b1fd88303af59a5912779238049022ff931a8ddfd32d
            • Opcode Fuzzy Hash: 8a4a9184571c56d5fbdeeed28bac1d6b598962224e41b7f47917af0494116bf4
            • Instruction Fuzzy Hash: C5B2C032908BC585E722AF28D8453E973B4FB5878CF159222DF8C97765EF79A295C300
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: arenegyl$modnarod$setybdet$uespemos
            • API String ID: 0-66988881
            • Opcode ID: 4b29c4a4507581d7e1da77fe464455ce379ef3a92620cb91d273da63a6f9e15b
            • Instruction ID: c1545e6b05180d07336f7153acc17a5e4aab070f7172babc241ac0726ab032bf
            • Opcode Fuzzy Hash: 4b29c4a4507581d7e1da77fe464455ce379ef3a92620cb91d273da63a6f9e15b
            • Instruction Fuzzy Hash: 8C228762F18BD542EB10AF69A0016BA6760EB85BA8F509731DF6E937C4DFBDC645C200
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: arenegyl$modnarod$setybdet$uespemos
            • API String ID: 0-66988881
            • Opcode ID: 59d114cbb7cf3425f7ca0be32757e0dd253bab9e5344c840892f3e5284e7499f
            • Instruction ID: a249c202abdcfc5a2c541127104368552a191fabd4f30b89dfe9b8181fc551db
            • Opcode Fuzzy Hash: 59d114cbb7cf3425f7ca0be32757e0dd253bab9e5344c840892f3e5284e7499f
            • Instruction Fuzzy Hash: 93322863E0CBC482E701AB2895117B96320FBA5B98F18A331DFAD57692DF79D2D5C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeapInformationProcessQuery$ErrorInfo
            • String ID:
            • API String ID: 2435025923-0
            • Opcode ID: aefaae2991cdcca937f8805b98e610eb725170b33302470b404fb9bf8290d560
            • Instruction ID: 97510311662edf156a3bcf5350a93218da28082f0e5a8b9ed8396e40a67a584b
            • Opcode Fuzzy Hash: aefaae2991cdcca937f8805b98e610eb725170b33302470b404fb9bf8290d560
            • Instruction Fuzzy Hash: A131D7A1B0DA4281FB25BB16E81472E6351AF84BC8F644034DF4EC7794DEBEE555CB00
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: )HRESULT($,(><&*@$SizeLimitExhausted$called `Result::unwrap()` on an `Err` value
            • API String ID: 0-3539436319
            • Opcode ID: 9d23b0ab8449dc5eef79854cf9a7370b06aca92b7b83ff3c7003b7b3df87a5a2
            • Instruction ID: 1dd2092454327e6e46eebd93bde1bb56833f8139c2c43dbdc856f796da37b061
            • Opcode Fuzzy Hash: 9d23b0ab8449dc5eef79854cf9a7370b06aca92b7b83ff3c7003b7b3df87a5a2
            • Instruction Fuzzy Hash: 0A726422A2C69241EA34BB24E404A792B51ABC679CF744171EB5EC77D4DEBFE542CF00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorLastProcessTimes
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 57209380-2333694755
            • Opcode ID: 1f5220393dd00f8cc6cd36fd9c17d4f072205a961cd2a5d215843e3d7edae8a9
            • Instruction ID: 8e530f87f85273b37fdb4a4193c27e736f9f7e1bcc477afd015d4b390612f361
            • Opcode Fuzzy Hash: 1f5220393dd00f8cc6cd36fd9c17d4f072205a961cd2a5d215843e3d7edae8a9
            • Instruction Fuzzy Hash: 0E128132A1DBC581E761AB15E4443AEB7A0FB85788F608235DB8C83B69DF7DD195CB00
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: arenegyl$modnarod$setybdet$uespemos
            • API String ID: 0-66988881
            • Opcode ID: 091a6ccc470660735186cab2d3ba8baf3d4db2c4787f97b06491e137317c6e4c
            • Instruction ID: 071927799b550ac06fd3d263d9e437f30218d7cdcd7c9ff600e1d6459755fb36
            • Opcode Fuzzy Hash: 091a6ccc470660735186cab2d3ba8baf3d4db2c4787f97b06491e137317c6e4c
            • Instruction Fuzzy Hash: D73128E6B08F8042FE50E7E5787636BA262A3457C0F40E136EE4D9770ADF3DD2528644
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: arenegyl$modnarod$setybdet$uespemos
            • API String ID: 0-66988881
            • Opcode ID: 215142dcae602d2f3ea4f96f8ee62933ef056d2c9625af10d25925b5ae7517e8
            • Instruction ID: af2b18209a4f0f5b8f3b4e59e55d5ee570df1f6b6091f39cf244ff22b03fff3f
            • Opcode Fuzzy Hash: 215142dcae602d2f3ea4f96f8ee62933ef056d2c9625af10d25925b5ae7517e8
            • Instruction Fuzzy Hash: 5921B8E5B58F8042FE80E7D5787636BA262A3457C0F50E036EE4D9770ADF3DD1518644
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 3298025750-2333694755
            • Opcode ID: 6e4937fee7c7a55aa6301b56376344d1ec6df4137dbaf70a1476a3a2625a15d3
            • Instruction ID: ff86766375b8c737183aafa955ef50dfad064ac684e22580fb1ca218a1121f25
            • Opcode Fuzzy Hash: 6e4937fee7c7a55aa6301b56376344d1ec6df4137dbaf70a1476a3a2625a15d3
            • Instruction Fuzzy Hash: D8B13562A1CA8582E720AB19E4407F96361FB947A8F505331DF9D937D4DF7ED282CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap$Version
            • String ID:
            • API String ID: 1840724253-0
            • Opcode ID: a72f4c9e079ac8a3ce135bd6d862b880c031928838592dab96eef995c5568dfc
            • Instruction ID: a5a1a187f48220230cfaf56af0132eff9043fa86368627d2b1226e0b3d1de086
            • Opcode Fuzzy Hash: a72f4c9e079ac8a3ce135bd6d862b880c031928838592dab96eef995c5568dfc
            • Instruction Fuzzy Hash: 2E4132B5A0D64282FA24BB12A5503BA63D0AF44BC8F644075CB4EC77D1DEBFE512CE00
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4daed141aaf80f77204560b4c978669ef312012ad47e0df97da8f5effd88428e
            • Instruction ID: 0a676425c527182b5dd4e90872238e72775ab14ea519d9d4e3c436c20ef13612
            • Opcode Fuzzy Hash: 4daed141aaf80f77204560b4c978669ef312012ad47e0df97da8f5effd88428e
            • Instruction Fuzzy Hash: D702E923918BD081E3519F20E9543FB3360F7A9B4CF1A6238DF894A299DFBA91D58750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExceptionRaise_clrfp
            • String ID:
            • API String ID: 15204871-0
            • Opcode ID: 6d2e215f2959516b1cd13a85171f3894bb8fe4bb0b357a9f0567bd10e4720504
            • Instruction ID: 9820636f9bfe9954b2c01c2e190840f30597c05df82f1315af74106289f58eb3
            • Opcode Fuzzy Hash: 6d2e215f2959516b1cd13a85171f3894bb8fe4bb0b357a9f0567bd10e4720504
            • Instruction Fuzzy Hash: 24B13973608B898AEB15EF29C8463687BA0F744B4CF258921DB6DC37A4CF7AD455CB00
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: HeapProcess
            • String ID: arenegyl$setybdet
            • API String ID: 54951025-2199462733
            • Opcode ID: 4d3aca2e3e5b4ee9a23cf643c6e151bb07011e25286dd1cac9bd308edabbd955
            • Instruction ID: 3f21ca11d2bc1f222800781ab0f819b0d04981867e28d2923a6e53b91d3306a6
            • Opcode Fuzzy Hash: 4d3aca2e3e5b4ee9a23cf643c6e151bb07011e25286dd1cac9bd308edabbd955
            • Instruction Fuzzy Hash: 96514823B1869186F294BF69BA503A72A10F348798F8C642AEF5CC7351DE79E7D1C340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 0-2333694755
            • Opcode ID: 5d42bcdef6d1f227f926da1eb309304927c1c2cf1daceb0424439c60706f25c3
            • Instruction ID: a0e84b87d70808cf99536ad8c6308bc18d19735445b47e6136560afae225f883
            • Opcode Fuzzy Hash: 5d42bcdef6d1f227f926da1eb309304927c1c2cf1daceb0424439c60706f25c3
            • Instruction Fuzzy Hash: 4DF14972B1C2A546EB20FB219454FBD6651B710B98F64A231DF5ED3BC0DEBEE6118B00
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: punycode{-}0
            • API String ID: 0-2450133883
            • Opcode ID: c8977955ea4242d4e23ec754ed3e6dbded2bd98ab22a7f6ee86e15f2f77d98f1
            • Instruction ID: a53347029c6760be753da1dd0af3baca1836afec3f2093d933e494f585cc56b6
            • Opcode Fuzzy Hash: c8977955ea4242d4e23ec754ed3e6dbded2bd98ab22a7f6ee86e15f2f77d98f1
            • Instruction Fuzzy Hash: 44E10262B1C68542EB60FB15E44477A6791ABC97C8F248131DF4DC3B94DEBEE449CB00
            APIs
              • Part of subcall function 00007FF642192750: BCryptGenRandom.BCRYPT ref: 00007FF64219276F
              • Part of subcall function 00007FF64218F680: GetProcessHeap.KERNEL32(?,?,?,?,00007FF64217875D,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218F697
              • Part of subcall function 00007FF642192880: GetSystemInfo.KERNEL32 ref: 00007FF6421928CA
              • Part of subcall function 00007FF642167B00: HeapFree.KERNEL32 ref: 00007FF642167C95
            • NtQuerySystemInformation.NTDLL ref: 00007FF642163B2B
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: HeapSystem$CryptFreeInfoInformationProcessQueryRandom
            • String ID:
            • API String ID: 3190741376-0
            • Opcode ID: 8b433a097c9d8a0fb87a35b104813351ee33878ba528f72bb26e3f39f9b1abe1
            • Instruction ID: ff7c43ed94da88d2d4e2034c241fcb87928895c7bf91f752b4db9e6ed1baff17
            • Opcode Fuzzy Hash: 8b433a097c9d8a0fb87a35b104813351ee33878ba528f72bb26e3f39f9b1abe1
            • Instruction Fuzzy Hash: 9B812B35A0DBC189E720AF25D8507E933A1F744B8CF644539DA4C8BB99DFBEA245C740
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4f5c48fe83a3557614dec2960ab8c9f2fc8c32384796dce6831cbf8c5ce3dce0
            • Instruction ID: 35cdfd923c2846cc6c2db400eb9f7502b4b41306cb9cf26f0e7344ef2509af0b
            • Opcode Fuzzy Hash: 4f5c48fe83a3557614dec2960ab8c9f2fc8c32384796dce6831cbf8c5ce3dce0
            • Instruction Fuzzy Hash: 6351B722B0C78145F720FB71A8406AE7BA1FB407A8F244135EF5DE7A99DE7DD4458B00
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 0-2333694755
            • Opcode ID: dfcd63ef5008ca0bf96eb2a107c1decd82604d056e39117fceebdcb6a985e2af
            • Instruction ID: 42b9747032010b9ed01450fc822e69da26387be2f7f90225cff3dff232319a67
            • Opcode Fuzzy Hash: dfcd63ef5008ca0bf96eb2a107c1decd82604d056e39117fceebdcb6a985e2af
            • Instruction Fuzzy Hash: 66C166A2D0C2D604FB61BA64C4007B96A819FC1769F74A330CB6DD72D0CEFE59819B40
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 0-2333694755
            • Opcode ID: 7dbc744744d9732bf11cda3bb09aecea9aa1c271f67fc9baf931d4103ebad9c6
            • Instruction ID: f95e5f3ea15c8855dd7650ad3ce656c509b45933f62ccbd49e8e122c5d740cd6
            • Opcode Fuzzy Hash: 7dbc744744d9732bf11cda3bb09aecea9aa1c271f67fc9baf931d4103ebad9c6
            • Instruction Fuzzy Hash: 40C13462E1CA5243EA257B15D19023A67A1FF41798F20A133DB9FC3BD0EEFEE5419640
            APIs
              • Part of subcall function 00007FF64218F680: GetProcessHeap.KERNEL32(?,?,?,?,00007FF64217875D,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218F697
            • NtQuerySystemInformation.NTDLL ref: 00007FF642163B2B
              • Part of subcall function 00007FF642198EF0: GetErrorInfo.OLEAUT32 ref: 00007FF642198F0F
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorHeapInfoInformationProcessQuerySystem
            • String ID:
            • API String ID: 649050420-0
            • Opcode ID: 4396851a83d91ac7a760ac44cfd8304bc245d5d79059005b4f36a669e9cdb7f9
            • Instruction ID: 11d58c4672a01d80e43c142887cdf278d49c2698c34ac7c44d55f0b63e5025a1
            • Opcode Fuzzy Hash: 4396851a83d91ac7a760ac44cfd8304bc245d5d79059005b4f36a669e9cdb7f9
            • Instruction Fuzzy Hash: 6A213D61B0CB8185FB64BF25C8943BD6292FB44B8CF249439CA4CCB784DFBEA5498750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CryptRandom
            • String ID:
            • API String ID: 2662593985-0
            • Opcode ID: 41c4d9f4940d2327327a6471827489626223dd5be0897d4ca53c7c75248bee79
            • Instruction ID: 9891984804d9a313d67eda6fa388745d3feb811ce1fbadecede87ee090a69e56
            • Opcode Fuzzy Hash: 41c4d9f4940d2327327a6471827489626223dd5be0897d4ca53c7c75248bee79
            • Instruction Fuzzy Hash: E8F0C224B0CAC181DB18A726E4483AA2761FB58B8CF604135DE4CD7720DEAEE196CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CryptRandom
            • String ID:
            • API String ID: 2662593985-0
            • Opcode ID: 85d3d87ec3ae9306377e1e579e3dc3a85b1015bbdc692d8c4d3db3c39138e83c
            • Instruction ID: feb19d562e3e1c6d70b6f6a302a343c2e9c9c1eba54d3c0fd8165b369aa3b980
            • Opcode Fuzzy Hash: 85d3d87ec3ae9306377e1e579e3dc3a85b1015bbdc692d8c4d3db3c39138e83c
            • Instruction Fuzzy Hash: 74F0B424A0CAC181E754AB15E44439A27B0BB58B4CF604136DE8CC7760DFBFD196CB01
            APIs
            • HeapFree.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00007FF64217FAF9), ref: 00007FF64217C44D
              • Part of subcall function 00007FF64218F680: GetProcessHeap.KERNEL32(?,?,?,?,00007FF64217875D,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218F697
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$FreeProcess
            • String ID:
            • API String ID: 3859560861-0
            • Opcode ID: b75cf6c0edaa9305784afdbcaf164495b9bcf48f75dd4daefb6abe6011eed618
            • Instruction ID: 00cad7618b9de2b324689ca958929badb5335134c01eae15cf0defba4c50a288
            • Opcode Fuzzy Hash: b75cf6c0edaa9305784afdbcaf164495b9bcf48f75dd4daefb6abe6011eed618
            • Instruction Fuzzy Hash: FC612152F1D68189FB10B6A9C8413FE2A60AB947ACF244535DF4EC77C6CEBD9285C700
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5c91037ac65f3e87fb9d337db9926f8c374840e56dd3df8a0e70c67a4d371263
            • Instruction ID: 99a9543f1753564a2f5da7d6ce5ed22c224e65d34008dddaf19027680fe011c6
            • Opcode Fuzzy Hash: 5c91037ac65f3e87fb9d337db9926f8c374840e56dd3df8a0e70c67a4d371263
            • Instruction Fuzzy Hash: D8C11612B1C68A40FA74BA21E6057B95791FFD138CF641033DB8EC3A95DFAEE1468B00
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 95aefe72aad35b123a19ae71cd3193c3c6eb714e23dc8b29f8ad5407dec6b0a5
            • Instruction ID: 584a8e39cdd42685330476c32366a70262a45f24b0807835d006fea382a228e8
            • Opcode Fuzzy Hash: 95aefe72aad35b123a19ae71cd3193c3c6eb714e23dc8b29f8ad5407dec6b0a5
            • Instruction Fuzzy Hash: A1B1AF96F39BA502E713573C5402BB596005FA77E8A01E322FEE4F2FD5DB59E6438204
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 54a548c245abc118d5624b5f1ee4bb27c9b9989f3ab1d22fd6a178af0f79fd02
            • Instruction ID: d33e9a6fc2738bde2555f7b21e3d83c1b702278f962fd61dab7334d110922bcf
            • Opcode Fuzzy Hash: 54a548c245abc118d5624b5f1ee4bb27c9b9989f3ab1d22fd6a178af0f79fd02
            • Instruction Fuzzy Hash: 8D910912A0CB8581E660BFA4D0005B96750FBC5B9CF681632EB8ED3784CFBEE595C700
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b1205c085f52d671d95f1da9ba140c734ff70df25a04b8f0e393dc707d123be9
            • Instruction ID: 55900d85439539bf36524efcf784fdaa3d4be01da4a45bf98f9588189e0452bb
            • Opcode Fuzzy Hash: b1205c085f52d671d95f1da9ba140c734ff70df25a04b8f0e393dc707d123be9
            • Instruction Fuzzy Hash: B1612362A1C28686F760AA69D04037B6EA0F7447D8F644135EB8FD77C9CEBED590DB00
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 072ec80d1324f5e32eb8a41e145f2cf0a016aa475cf66d7be5ef579617e74e12
            • Instruction ID: 98214305dcc4eada95050a45a72b11690c7cc937c4e211990aaedc5aa2475e12
            • Opcode Fuzzy Hash: 072ec80d1324f5e32eb8a41e145f2cf0a016aa475cf66d7be5ef579617e74e12
            • Instruction Fuzzy Hash: A6412972F4866582FA54EB61F164A793611F390FD4F115132CF1AA3B80CE79D966C780
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: 48f4c9434cd95cd0efd539d507531176937577b9bd3d96c335e671109a807226
            • Instruction ID: 4641710d7f5d7474d0954f9c0ff5d66928b527643df9a0bbd6f301d8698d5f47
            • Opcode Fuzzy Hash: 48f4c9434cd95cd0efd539d507531176937577b9bd3d96c335e671109a807226
            • Instruction Fuzzy Hash: 31410866718A9482EF04EF2AD954169B3A2BB48FD8B189037DF0DC7B58DE7DD452C700
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 485668acbd0f64095f85b8463ccdaa19b6598de98d93daaf4dc60470729e17ef
            • Instruction ID: 8a978aefaa390f7331085d891e799b795c1e25d4fd53ccad2d3c3429afeb907a
            • Opcode Fuzzy Hash: 485668acbd0f64095f85b8463ccdaa19b6598de98d93daaf4dc60470729e17ef
            • Instruction Fuzzy Hash: 15F04F75B1C2958AEBA4AF29A80363977E0F708784F908079D68DC3A14DA7E90619F04
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 095a85b91e11b2f9bd9ad45127e04a5bc6233a8dc0752a301b538f28a29222c9
            • Instruction ID: 8e04e5f90022c081479e09d6e7c24eecce3d0071314b47cf7e12d5827f7e27a8
            • Opcode Fuzzy Hash: 095a85b91e11b2f9bd9ad45127e04a5bc6233a8dc0752a301b538f28a29222c9
            • Instruction Fuzzy Hash: 40A0016190DE12D4E608BB00A8500612260AB50B98B614432C24DC24609EFEA498CA00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExclusiveLock$AcquireConditionFreeHeapReleaseVariableWake
            • String ID: NulErrorUtf8Errorvalid_up_toerror_lenNoneSome$assertion failed: t.get().eq(&(self as *const _))$assertion failed: t.get().is_null()$called `Result::unwrap()` on an `Err` value
            • API String ID: 2884296031-2362296343
            • Opcode ID: a1aa497c344f79415d7402752085712843ed56f430b084941ccd609744533c8c
            • Instruction ID: 1414c4fdede81878fd434e901866b3acfc4a69269fa2bd34cc8b5b3ff9bd37f8
            • Opcode Fuzzy Hash: a1aa497c344f79415d7402752085712843ed56f430b084941ccd609744533c8c
            • Instruction Fuzzy Hash: F3B16C36A0DA8681EB61BB15E4903FD2760EB54B9CFA45132CB5DC33A4DEBED449CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorLast$HeapToken$InformationProcess$AllocCloseCopyFreeHandleLengthOpenValid
            • String ID:
            • API String ID: 9828444-0
            • Opcode ID: f3411f48fb865e8facba581bcaea052440f6dddb8dbe165539584f630f769040
            • Instruction ID: 0620bfabbea40c39a1d1befb92bf1493fd252bffce722b497bb1e9fb01845190
            • Opcode Fuzzy Hash: f3411f48fb865e8facba581bcaea052440f6dddb8dbe165539584f630f769040
            • Instruction Fuzzy Hash: 41415521A0DA8281FB50BB22A94577A6390FF45B88F244035DF9EC7794DFBEE459CB10
            APIs
            Strings
            • internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs, xrefs: 00007FF64217E810
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast$EnvironmentVariable
            • String ID: internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs
            • API String ID: 3632352037-4032025951
            • Opcode ID: e13e0f180d28a1db871200428a10e16b883d01434fb247a582170e3fe2aa63af
            • Instruction ID: 49e0abd66318bd6141d976baf3eb7717d7cee38897a0ce2d5b2e6daa344a7bc5
            • Opcode Fuzzy Hash: e13e0f180d28a1db871200428a10e16b883d01434fb247a582170e3fe2aa63af
            • Instruction Fuzzy Hash: 1E81AF22A0CAC289E771BF21DC443F863A4AB847ACF244135DF5CDB695DFB9A285C740
            APIs
            Strings
            • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF64218B129
            • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 00007FF64218B164
            • failed to spawn thread, xrefs: 00007FF64218B0E6
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Handle$CurrentDuplicateProcess$CloseErrorLast
            • String ID: called `Result::unwrap()` on an `Err` value$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$failed to spawn thread
            • API String ID: 120317985-1085459851
            • Opcode ID: 61db1ca7ff46adb7f9686e8e47a660a19523536785ce4043ba6c77490a5370fb
            • Instruction ID: 2b6bf02f0ad90fd5f998465854b9c819d3d6899ccd22bda6c9bb54950c04bd6c
            • Opcode Fuzzy Hash: 61db1ca7ff46adb7f9686e8e47a660a19523536785ce4043ba6c77490a5370fb
            • Instruction Fuzzy Hash: 62C16A22A0DA8289EB51BB60D8803BD27A0FF4474CF244536EB4DC3795DFBEE5858B40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
            • String ID: }0x$Utf8Errorvalid_up_toerror_lenNoneSome$called `Result::unwrap()` on an `Err` value
            • API String ID: 1956605914-2833317390
            • Opcode ID: 7bd926a656e1dac53ce11b122b43920e1fbceb516ce8416653b7c2c193392836
            • Instruction ID: 9c779c6747d9d5f19c28ccf15600e8e0f014e89934114afaab3b178d1c8db7d4
            • Opcode Fuzzy Hash: 7bd926a656e1dac53ce11b122b43920e1fbceb516ce8416653b7c2c193392836
            • Instruction Fuzzy Hash: 2981A362A1C64286EB20BB11E4403B96761FBC4788F744135DB8DC7BA5DFBED589CB00
            APIs
            Strings
            • internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs, xrefs: 00007FF64217FB72
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorLast$FreeHeap$FileModuleName
            • String ID: internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs
            • API String ID: 526635459-4032025951
            • Opcode ID: 76b46c6751f00fccc60f542933f2e9be16d2ad7bc7fa04832f624375acc5784d
            • Instruction ID: 0b50261046cf23d8ca7986f70f3bbef32fcdd5043ba5a74fc6465beae1e12fc1
            • Opcode Fuzzy Hash: 76b46c6751f00fccc60f542933f2e9be16d2ad7bc7fa04832f624375acc5784d
            • Instruction Fuzzy Hash: 19519022A0CBC259E771BF25EC543EA2254FB84BACF604131DE5DD7690DEFE92898700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorLastSleep
            • String ID:
            • API String ID: 1458359878-0
            • Opcode ID: 786e7a925a4705530903a43fcf8dcbdb85ea6d2d4e21f71ab40edc598bfac47e
            • Instruction ID: 72cdd23344cff347e0e303bab18074a499ca0dcef30e3cb4242428966ee2270c
            • Opcode Fuzzy Hash: 786e7a925a4705530903a43fcf8dcbdb85ea6d2d4e21f71ab40edc598bfac47e
            • Instruction Fuzzy Hash: F5813E22608BC699E731AF25EC407F92760FB4479CF144136DA9CCBB98CFB99286D740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 849930591-393685449
            • Opcode ID: 72ab26a4402c56652830c5fa1d3399aafbf85f533fd71610aa92c533a6f5ca46
            • Instruction ID: 5d0d0d562f76c596f896deda9e6aef2ec41a54266ebae3a846eb5ee49779347f
            • Opcode Fuzzy Hash: 72ab26a4402c56652830c5fa1d3399aafbf85f533fd71610aa92c533a6f5ca46
            • Instruction Fuzzy Hash: F8E14AA2A0C781CAEB20FB6594412AD77A0FB49B9CF240135DB8DD7B55DF79E5A0CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID: <unnamed>$RUST_BACKTRACEfailed to write the buffered data$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$lluf$mluf
            • API String ID: 3298025750-386205353
            • Opcode ID: b8c96b04ffad42163d9c6d3a6d1a143450d8c47edeccfb91b2d6f72a63da962e
            • Instruction ID: 66fd3b23aefb5c5077f49204e80fab5ad40537ef5eacc92a39162c3f30491f98
            • Opcode Fuzzy Hash: b8c96b04ffad42163d9c6d3a6d1a143450d8c47edeccfb91b2d6f72a63da962e
            • Instruction Fuzzy Hash: 30616B36A0DA4288EB61BF65D4503B837A1EB58B8CF244036DB4EC37A4DEAEE555C701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressFreeLibraryProc
            • String ID: api-ms-$ext-ms-
            • API String ID: 3013587201-537541572
            • Opcode ID: 6a070d9bb71604036c105590dbace6c5af477c2d24527ad144b48d81c656a169
            • Instruction ID: 58cd74618f1a7e9eb2d7286d1ea8e4e640682b0442d931417dbd109fb3df935b
            • Opcode Fuzzy Hash: 6a070d9bb71604036c105590dbace6c5af477c2d24527ad144b48d81c656a169
            • Instruction Fuzzy Hash: 6841E521B1DA0282FB55FF1698042766391BF85BE8F654536DF0DC7784EEBEE4498B00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CopyErrorLast$HeapLengthProcessValid
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 2147234612-2333694755
            • Opcode ID: 7043026bc7d90f15722716711432570e87a0e382c47e925f302a8d7343d08212
            • Instruction ID: b5cb7b0b8f25434a4433645db99c42122a991cfdaba752b6d822cd6ce19ccd87
            • Opcode Fuzzy Hash: 7043026bc7d90f15722716711432570e87a0e382c47e925f302a8d7343d08212
            • Instruction Fuzzy Hash: 5F31C771A0DB4285F754BB21A9403BA6291AF49BD8F248134DF4DD7790EEBEE586CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap$ErrorGuaranteeLastStackThread
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 3680998240-2333694755
            • Opcode ID: 6a6b5a6c96b756cfa57c6a058bff5de6a9d36b5a0abdc6689987a460b71ba9ef
            • Instruction ID: 2eae134da2913ed0c316fcd86e70ac29f74c04bde61c417049025d5a06db9fec
            • Opcode Fuzzy Hash: 6a6b5a6c96b756cfa57c6a058bff5de6a9d36b5a0abdc6689987a460b71ba9ef
            • Instruction Fuzzy Hash: E2414B32E08E4189E714EB65D8842EC2770FB48B58F648536CB5DD37A4DFB9D58AC740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CompareOrdinalString
            • String ID:
            • API String ID: 2409332303-0
            • Opcode ID: f9020d7bf176814af53c865c8d0d8900c9f6b24ebf022bb7cc9cc610dd337ddb
            • Instruction ID: 9dab4382fd204646e68e6ff5e517d110237072b6541639020e97cff668739e9c
            • Opcode Fuzzy Hash: f9020d7bf176814af53c865c8d0d8900c9f6b24ebf022bb7cc9cc610dd337ddb
            • Instruction Fuzzy Hash: 0BE16D66609AC589EB70AF21EC403FA23A5FB4479CF644136CB4DCBB98DF799545CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorLast$Process$Times$CountersFileFreeHeapInfoMemoryModuleNameSystem
            • String ID:
            • API String ID: 3577777124-0
            • Opcode ID: ee9a7a875680fedd2ec005248d311c7b53517d63ffa6c970e3b80b972fd4fbc4
            • Instruction ID: 6f66af58489219327e2abf109767a1ff41f0005c19f12be5f177a50fb67c3d74
            • Opcode Fuzzy Hash: ee9a7a875680fedd2ec005248d311c7b53517d63ffa6c970e3b80b972fd4fbc4
            • Instruction Fuzzy Hash: 3091C661B0CBC592EB59AB25D5003A9A760FF44B94F248631DB9CC3795EFBDE0A5CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID:
            • API String ID: 3298025750-0
            • Opcode ID: 03e2a55060cdd5a8d773200eafc10e70de68ba70a410870847454a390be6e2b9
            • Instruction ID: 26c308c97d778e1565fa4dfc3949f49333da5ca80cee051fea7b3ebc2cd5cb44
            • Opcode Fuzzy Hash: 03e2a55060cdd5a8d773200eafc10e70de68ba70a410870847454a390be6e2b9
            • Instruction Fuzzy Hash: C0514326A0DA41C2FB64BB16A4403BA6361EF48B98F684035CB4EC7760DFBEF495C701
            APIs
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF64219DC0E,?,?,?,00007FF64219D900,?,?,00000001,00007FF64219BEF1), ref: 00007FF64219D9E1
            • GetLastError.KERNEL32(?,?,?,00007FF64219DC0E,?,?,?,00007FF64219D900,?,?,00000001,00007FF64219BEF1), ref: 00007FF64219D9EF
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF64219DC0E,?,?,?,00007FF64219D900,?,?,00000001,00007FF64219BEF1), ref: 00007FF64219DA19
            • FreeLibrary.KERNEL32(?,?,?,00007FF64219DC0E,?,?,?,00007FF64219D900,?,?,00000001,00007FF64219BEF1), ref: 00007FF64219DA5F
            • GetProcAddress.KERNEL32(?,?,?,00007FF64219DC0E,?,?,?,00007FF64219D900,?,?,00000001,00007FF64219BEF1), ref: 00007FF64219DA6B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Library$Load$AddressErrorFreeLastProc
            • String ID: api-ms-
            • API String ID: 2559590344-2084034818
            • Opcode ID: c1aa25fe3c16cea60b2a4e569bc7c66438893de353299551f1f2a246b98a77db
            • Instruction ID: 755a5bd945f01bd9fccedbec7b5aa784035f516802f6f15b28e51efd3e0d0186
            • Opcode Fuzzy Hash: c1aa25fe3c16cea60b2a4e569bc7c66438893de353299551f1f2a246b98a77db
            • Instruction Fuzzy Hash: 1A31C421A1EB42D2EE15BF02980057522A4BF44BA8F690535DF2DCB790DEFEE474CB01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: d9f0b9edf18b466510cdc7d3cb3595672746ffb6cd67beaeecbd3545c46b3673
            • Instruction ID: 7dfcc6af5403e2a65935ba54f41c831ea20596c0d4de971d8033dbffc196ee09
            • Opcode Fuzzy Hash: d9f0b9edf18b466510cdc7d3cb3595672746ffb6cd67beaeecbd3545c46b3673
            • Instruction Fuzzy Hash: 2421C224E0D24292FA687725555623951819F447BCF344734DB3EC76D6DEEEA812CE00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
            • String ID: CONOUT$
            • API String ID: 3230265001-3130406586
            • Opcode ID: 811d4d14569b1174cae0347234938108d79ecde9c689091188e43e030fa17b8b
            • Instruction ID: 245208c6aac89ad06ca2aeb4f102c6afa1f4a5ca956a9c12a2c93413c4f5699b
            • Opcode Fuzzy Hash: 811d4d14569b1174cae0347234938108d79ecde9c689091188e43e030fa17b8b
            • Instruction Fuzzy Hash: 24118121A1CA4186E750BB12E85433966A0FB88FE8F204234DB5DC7B94DFBDD949CB44
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressProc$HandleModule
            • String ID: WaitOnAddress$WakeByAddressSingle$api-ms-win-core-synch-l1-2-0
            • API String ID: 667068680-1826242509
            • Opcode ID: 80c5ba1dada369da22440cf653c03e5e07a81bf50da2b6e88ff490cc949a36c8
            • Instruction ID: fa16c2a682b87f9e243fb5d9957e3f55f2b26ab0636087387f2478a358e07ab3
            • Opcode Fuzzy Hash: 80c5ba1dada369da22440cf653c03e5e07a81bf50da2b6e88ff490cc949a36c8
            • Instruction Fuzzy Hash: F7F0FE24F0EA4781FE56BB11F9445B422A0AF88B98F644075CA5DC7364EFAFA44ACA00
            APIs
            • HeapFree.KERNEL32(?,?,?,?,00000001,?,?,?,?,00000000,?,00007FF64216C7EB,00000000,?,?,?), ref: 00007FF64216CEF6
            • HeapFree.KERNEL32(?,?,?,?,00000001,?,?,?,?,00000000,?,00007FF64216C7EB,00000000,?,?,?), ref: 00007FF64216CF1A
            • HeapFree.KERNEL32(?,?,?,?,00000001,?,?,?,?,00000000,?,00007FF64216C7EB,00000000,?,?,?), ref: 00007FF64216CF4F
            • HeapFree.KERNEL32(?,?,?,?,00000001,?,?,?,?,00000000,?,00007FF64216C7EB,00000000,?,?,?), ref: 00007FF64216CFA6
            • HeapFree.KERNEL32(?,?,?,?,00000001,?,?,?,?,00000000,?,00007FF64216C7EB,00000000,?,?,?), ref: 00007FF64216CFE3
            • HeapFree.KERNEL32(?,?,?,?,00000001,?,?,?,?,00000000,?,00007FF64216C7EB,00000000,?,?,?), ref: 00007FF64216D020
            • HeapFree.KERNEL32(?,?,?,?,00000001,?,?,?,?,00000000,?,00007FF64216C7EB,00000000,?,?,?), ref: 00007FF64216D05C
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID:
            • API String ID: 3298025750-0
            • Opcode ID: dde2b2780bffd6f083ff53ef2705fc4ec5f43627bc733f3318b10d885f49e2b2
            • Instruction ID: 47dcdd67dd9b78c703ba5a71501d9651799f5122e7c34b3940dcbeadbe2b2289
            • Opcode Fuzzy Hash: dde2b2780bffd6f083ff53ef2705fc4ec5f43627bc733f3318b10d885f49e2b2
            • Instruction Fuzzy Hash: D1613F36A0DA8181E755BF2695843BD2761EF49FE8F685132CF1DC7294CFBA94868700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorHeapInfoString$AllocFreeProcess
            • String ID:
            • API String ID: 174895499-0
            • Opcode ID: 64b14102e1bda2af5313cd71ae6258c473e2ff326e148d4b7002b56503aded5a
            • Instruction ID: 27ae5b128e75d37a2f921da6e13e3ef04a0f25c7377fa8424723d2baf41bb1d3
            • Opcode Fuzzy Hash: 64b14102e1bda2af5313cd71ae6258c473e2ff326e148d4b7002b56503aded5a
            • Instruction Fuzzy Hash: 81716E21B0DB4282EA18BB16855437963A1BF88F98F258135CF5EC7790DFBEE554CB04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CloseHandle$FileSleepWrite
            • String ID:
            • API String ID: 3423119723-0
            • Opcode ID: 50f48fa2f1dfff0040be8c6eb8860c5caa61c06629ea0bc5aa9cef88ba84b49f
            • Instruction ID: 717b9da85ca16521c82e9d332dfc44a03c3baa3beceaec0d3365c5f89017328b
            • Opcode Fuzzy Hash: 50f48fa2f1dfff0040be8c6eb8860c5caa61c06629ea0bc5aa9cef88ba84b49f
            • Instruction Fuzzy Hash: 32415B22A08AC688E772BF25EC407F92760FB4479DF544132DE8CC7B98CEB99586D700
            APIs
            • GetLastError.KERNEL32(?,?,?,00007FF64219DFF2,?,?,?,00007FF6421ACBD6), ref: 00007FF64219FC0B
            • FlsSetValue.KERNEL32(?,?,?,00007FF64219DFF2,?,?,?,00007FF6421ACBD6), ref: 00007FF64219FC41
            • FlsSetValue.KERNEL32(?,?,?,00007FF64219DFF2,?,?,?,00007FF6421ACBD6), ref: 00007FF64219FC6E
            • FlsSetValue.KERNEL32(?,?,?,00007FF64219DFF2,?,?,?,00007FF6421ACBD6), ref: 00007FF64219FC7F
            • FlsSetValue.KERNEL32(?,?,?,00007FF64219DFF2,?,?,?,00007FF6421ACBD6), ref: 00007FF64219FC90
            • SetLastError.KERNEL32(?,?,?,00007FF64219DFF2,?,?,?,00007FF6421ACBD6), ref: 00007FF64219FCAB
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: 64fb91ebe04766192c5c1e30f9cf491a6fb2cacd05c529915a054ae8694d7015
            • Instruction ID: 00dc5a359669488cfda44bb3eec1f55f545f26e6f9ddc0307f298e5625f3afdd
            • Opcode Fuzzy Hash: 64fb91ebe04766192c5c1e30f9cf491a6fb2cacd05c529915a054ae8694d7015
            • Instruction Fuzzy Hash: FA116F24A0D24692FA54B335555253961829F447BCF348634DF2EC77D6DEEEA816CE00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Handle$CloseConsoleErrorLastMode
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 1170577072-2333694755
            • Opcode ID: 96d2bc424f8d22cb94cac6148f67ec255ca223446cb51e52ec21167fd4431b53
            • Instruction ID: 96238e3dba574940734f324b007b8af1cce4df3e7f7dab60f733b225bdd628bc
            • Opcode Fuzzy Hash: 96d2bc424f8d22cb94cac6148f67ec255ca223446cb51e52ec21167fd4431b53
            • Instruction Fuzzy Hash: 4FA16B62A0CA9698EB10BB61E9403EC2770BB8535CF644532DF9ED3785DFBDA189C710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
            • String ID: csm$f
            • API String ID: 2395640692-629598281
            • Opcode ID: f978b8b4f6eb7debb6680819d40ef3f2cd9f695ec70aafba99f54ddedc104446
            • Instruction ID: f3e46816aa7125c43053f9c37263cc2b1f30ee5399cc360c6ce9638b5aabd9e2
            • Opcode Fuzzy Hash: f978b8b4f6eb7debb6680819d40ef3f2cd9f695ec70aafba99f54ddedc104446
            • Instruction Fuzzy Hash: BC516D32A0D642C6DB14FB15E444B6967A9FB44B8CF718034DB1AC7788DFBAEA51CB40
            APIs
            Strings
            • internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs, xrefs: 00007FF6421ABE92
            • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF6421ABE70
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExclusiveLock$AcquireConditionReleaseSleepVariable
            • String ID: called `Result::unwrap()` on an `Err` value$internal error: entered unreachable codeC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\job.rs
            • API String ID: 1554092898-2323258618
            • Opcode ID: a23170424d2af1625816afd1274a588a6bd798be682a89b53bb5f1ad0ba3888d
            • Instruction ID: 976bfb3d9225bb96e60262cbe043320f998b89581b077cae7a232abcb8019671
            • Opcode Fuzzy Hash: a23170424d2af1625816afd1274a588a6bd798be682a89b53bb5f1ad0ba3888d
            • Instruction Fuzzy Hash: 9151932290DBC581EB20BB25E5407B96760FB65788F249131DF8DC3766DF7EE1998B00
            APIs
            • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642178D66), ref: 00007FF642178E0C
            • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642178D66), ref: 00007FF642178EC3
            • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642178D66), ref: 00007FF642178F04
            • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF642178D66), ref: 00007FF642178F58
            Strings
            • lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs, xrefs: 00007FF642178DED
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExclusiveLock$Release$AcquireFreeHeap
            • String ID: lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs
            • API String ID: 2563869513-2303981482
            • Opcode ID: 5daca773748e2f7817cb8baab1cae2b99ac0e1055b29a0a25c5a3408f8e8635c
            • Instruction ID: d81e9e9bffb2473f656faddf3cef2e0e10b48de3fc4d1eba176eeb8536bfb59e
            • Opcode Fuzzy Hash: 5daca773748e2f7817cb8baab1cae2b99ac0e1055b29a0a25c5a3408f8e8635c
            • Instruction Fuzzy Hash: D1512D35E0CA8285F721FB65E8543B86760AF94B6CF644131CA5CC72A1DFBFA985CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: NtCreateKeyedEvent$called `Result::unwrap()` on an `Err` value$ntdll
            • API String ID: 1646373207-364940113
            • Opcode ID: de42f339dbfafa86921544b06341b63750b0d3bc1e629570e7857f4c336c5b4a
            • Instruction ID: 47638061154ed28a884c737b3eba9522e2c37367c581d7c2f2a05067054e2dc4
            • Opcode Fuzzy Hash: de42f339dbfafa86921544b06341b63750b0d3bc1e629570e7857f4c336c5b4a
            • Instruction Fuzzy Hash: C811A221F1CB4598E700FB61E8802A82774BB98768F644231DE5CC3B90EFB9A589C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: e9f060037b8fd1a9900d5e8e40cb5b126823032bb8d8f3b3b1ab61e00947e4da
            • Instruction ID: e4f863eb814d26225aa4920435e4bf60202775bca0ec7cbc4402ef784e698d25
            • Opcode Fuzzy Hash: e9f060037b8fd1a9900d5e8e40cb5b126823032bb8d8f3b3b1ab61e00947e4da
            • Instruction Fuzzy Hash: 3DF0446170CB0681EB10BB24E49437A5370BF48B69F640235DB6EC72E4DFAED049CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CloseHandle$FreeHeap
            • String ID:
            • API String ID: 2735614835-0
            • Opcode ID: 114ebed87ecc461a6c81ac0434252ff432b6bce6d1b019d28e43bdd067ec5db9
            • Instruction ID: 7419a904c04c2dcf34c570fbf97e28069ced969675136f3359069dc844d7484a
            • Opcode Fuzzy Hash: 114ebed87ecc461a6c81ac0434252ff432b6bce6d1b019d28e43bdd067ec5db9
            • Instruction Fuzzy Hash: E6518531A0D69186EB64BB1688842BD6351EF45BD8F682131CF2ED77D4DEBEE4418700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: _set_statfp
            • String ID:
            • API String ID: 1156100317-0
            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
            • Instruction ID: b8f7bd5d016da8336fc6820fa5de9a12b5f293b900ec8a6f8aca29d9e9172529
            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
            • Instruction Fuzzy Hash: 6711C1A2E1DE0705FB743128D55237D10406F9837CF790675EB6EC76E68EAEAA4A8900
            APIs
            • FlsGetValue.KERNEL32(?,?,00000000,00007FF64219FE2B,?,?,00000000,00007FF6421A00C6,?,?,?,?,?,00007FF6421A0052), ref: 00007FF64219FCE3
            • FlsSetValue.KERNEL32(?,?,00000000,00007FF64219FE2B,?,?,00000000,00007FF6421A00C6,?,?,?,?,?,00007FF6421A0052), ref: 00007FF64219FD02
            • FlsSetValue.KERNEL32(?,?,00000000,00007FF64219FE2B,?,?,00000000,00007FF6421A00C6,?,?,?,?,?,00007FF6421A0052), ref: 00007FF64219FD2A
            • FlsSetValue.KERNEL32(?,?,00000000,00007FF64219FE2B,?,?,00000000,00007FF6421A00C6,?,?,?,?,?,00007FF6421A0052), ref: 00007FF64219FD3B
            • FlsSetValue.KERNEL32(?,?,00000000,00007FF64219FE2B,?,?,00000000,00007FF6421A00C6,?,?,?,?,?,00007FF6421A0052), ref: 00007FF64219FD4C
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: 10c1b15db0d9e69b7360fb64859d65a1c643bac1d3934fe6005dbef432cf6c38
            • Instruction ID: 4f2f2338cdda9adc8a7feb2fcb024181e036516083aacc68d16dd4dfffc5a208
            • Opcode Fuzzy Hash: 10c1b15db0d9e69b7360fb64859d65a1c643bac1d3934fe6005dbef432cf6c38
            • Instruction Fuzzy Hash: C1117220E0D64292FA58B329554123992815F447BCF384335DB3DC76D6EDEFE822CE00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: 52c3098bb3d2d5b0921bbef1f3f1f7ce673cb4b8044c4f76f6e3757f50ffd989
            • Instruction ID: e5d0e3e00ceaef2b210aa9a2810499d96adb01fd9a6bda28a5c343f988b0b53d
            • Opcode Fuzzy Hash: 52c3098bb3d2d5b0921bbef1f3f1f7ce673cb4b8044c4f76f6e3757f50ffd989
            • Instruction Fuzzy Hash: 89115A14A0D24392FA68BA26446227951814F4477CF384738DB3FCB2D2EDEFB822DE01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorHandleLast$CurrentDuplicateProcess
            • String ID:
            • API String ID: 3697983210-0
            • Opcode ID: 66e8b521d7ab11fdc0f8415cc66ee55bf59a9d372ac864cdebc574e463c595b6
            • Instruction ID: 6215f449b204e0ea3bebd720bfdbda13da466074d6ddadb7947a96131cb79602
            • Opcode Fuzzy Hash: 66e8b521d7ab11fdc0f8415cc66ee55bf59a9d372ac864cdebc574e463c595b6
            • Instruction Fuzzy Hash: F2112161B0CA0186FB60BBA1A4853BD2660AF447ADF240239CF5DC77C5DFFE95898B50
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CallEncodePointerTranslator
            • String ID: MOC$RCC
            • API String ID: 3544855599-2084237596
            • Opcode ID: 109cb2fe54b35d8bb1d44f4b237a1c854c54e1c771541eb03d13f088e3a6d46b
            • Instruction ID: 9d3732f2c72e0986ee1afe4207866a09580ce48b4bf6649884d91085805b4146
            • Opcode Fuzzy Hash: 109cb2fe54b35d8bb1d44f4b237a1c854c54e1c771541eb03d13f088e3a6d46b
            • Instruction Fuzzy Hash: 0B614D76A08B85CAE710AF65D4403AD7BA0FB48B8CF244225DF8D97B94CF79E165CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
            • String ID: csm$csm
            • API String ID: 3896166516-3733052814
            • Opcode ID: 235481634b9598564d7783057544c2066f85393b7fe67a768a17d1646a1f7a83
            • Instruction ID: 5674dedef05c9d7102269d4adb18238a428becda6bb957c8145648fc06f986a5
            • Opcode Fuzzy Hash: 235481634b9598564d7783057544c2066f85393b7fe67a768a17d1646a1f7a83
            • Instruction Fuzzy Hash: B9519D7290C682C6EA24BF21D44436876A0EB58B98F284135DB9DC7A95CFBEE461CF04
            APIs
            Strings
            • assertion failed: injected && !worker_thread.is_null()C:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\registry.rs, xrefs: 00007FF642195CA8
            • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF642195C70
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap$AcquireConditionExclusiveLockVariableWake
            • String ID: assertion failed: injected && !worker_thread.is_null()C:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rayon-core-1.12.1\src\registry.rs$called `Result::unwrap()` on an `Err` value
            • API String ID: 2149175250-2936071865
            • Opcode ID: 10cd90343652960ae856554adba5c41d7848bda52d320045cba301882e718df0
            • Instruction ID: c7ed6245220b55e079e15664b8d7b9714a5cbecd8d5634c43459a13c3412e253
            • Opcode Fuzzy Hash: 10cd90343652960ae856554adba5c41d7848bda52d320045cba301882e718df0
            • Instruction Fuzzy Hash: 0961531190CAC591F661AB28E4013F9A760FF9475CF549131DBCD93662EF6EE1DACB00
            APIs
            Strings
            • stdoutlibrary\std\src\io\mod.rsadvancing io slices beyond their length, xrefs: 00007FF6421647B2
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExclusiveLock$FreeHeapRelease$AcquireSleep
            • String ID: stdoutlibrary\std\src\io\mod.rsadvancing io slices beyond their length
            • API String ID: 2475328964-3145101877
            • Opcode ID: 79730f0271721ccf683b51c4ad5348d038b8df33ec6ab605c8fe28823bbde194
            • Instruction ID: 0078b0c1436f9ce09f8578d81129b022af5409f9bdd3d393b1639e01cc5a286e
            • Opcode Fuzzy Hash: 79730f0271721ccf683b51c4ad5348d038b8df33ec6ab605c8fe28823bbde194
            • Instruction Fuzzy Hash: 7A610936A0DA8189EB70AF24D8807E923A4FB4574CF64113ACB5DC7794DFBEA644C740
            APIs
            Strings
            • unknownARM x64C:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\cpu.rs, xrefs: 00007FF6421981F8
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CallHeapInformationPower$FreeProcess
            • String ID: unknownARM x64C:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\cpu.rs
            • API String ID: 1351286460-2377213474
            • Opcode ID: b9d087bd9391b43aef60062ced9162c444aa62f2417d8964da2eeb67194f3ae6
            • Instruction ID: 1554c9f444a5d97c5221c194fbaf42b26ab58b3dbbbdc81a4b76952075ca642a
            • Opcode Fuzzy Hash: b9d087bd9391b43aef60062ced9162c444aa62f2417d8964da2eeb67194f3ae6
            • Instruction Fuzzy Hash: 0741F572A1D64282F715BF16A80432A62D1BF45798F658934CF8DC7390EFBEE545CB00
            APIs
            • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6421783CE), ref: 00007FF642178C8C
            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6421783CE), ref: 00007FF642178CA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: NtReleaseKeyedEvent$ntdll
            • API String ID: 1646373207-31681898
            • Opcode ID: ac648174810df1729c868640992e2bd5a4d2a3e4e2fe350e5af2acf71b23bbf5
            • Instruction ID: b460fdee634d5d0e304d09013a8d810222682816c73fb525a947e56fe21ec46c
            • Opcode Fuzzy Hash: ac648174810df1729c868640992e2bd5a4d2a3e4e2fe350e5af2acf71b23bbf5
            • Instruction Fuzzy Hash: 52318466A0EA4981EE50FB06F8403B967A1EB98B88F654035DE4DC3764DEBDD445DB00
            APIs
              • Part of subcall function 00007FF64218F680: GetProcessHeap.KERNEL32(?,?,?,?,00007FF64217875D,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF64218F697
            • ReadProcessMemory.KERNEL32(?,?,?,?,?,?,00007FF642196C98), ref: 00007FF642197868
            • GetLastError.KERNEL32(?,?,?,?,?,?,00007FF642196C98), ref: 00007FF642197890
            • HeapFree.KERNEL32(?,?,?,?,?,?,00007FF642196C98), ref: 00007FF6421978D1
            Strings
            • ReadProcessMemory returned unexpected number of bytes readUnable to read process dataC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\process.rs, xrefs: 00007FF6421978A9
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: HeapProcess$ErrorFreeLastMemoryRead
            • String ID: ReadProcessMemory returned unexpected number of bytes readUnable to read process dataC:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f\sysinfo-0.30.5\src\windows\process.rs
            • API String ID: 1816195746-2331781313
            • Opcode ID: f982e367781bb5e954ac2490a5636e33ba36dbde12c6a7960b8144e3a4fe35cd
            • Instruction ID: 0d2b9bd90f46013c156d550ea6f5521da2b29b553d4ce36bd6dd9f964bccef5d
            • Opcode Fuzzy Hash: f982e367781bb5e954ac2490a5636e33ba36dbde12c6a7960b8144e3a4fe35cd
            • Instruction Fuzzy Hash: 8321B261A0CA4291E720BB12B84437A62A4EF487E8F644530DF9DC77E0DFBDD156CB00
            APIs
            • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,?,00000002,?,00007FF6421AA263), ref: 00007FF64216C856
            • WakeConditionVariable.KERNEL32(?,?,00000000,?,00000002,?,00007FF6421AA263), ref: 00007FF64216C885
            • ReleaseSRWLockExclusive.KERNEL32(?,?,00000000,?,00000002,?,00007FF6421AA263), ref: 00007FF64216C8A7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExclusiveLock$AcquireConditionReleaseVariableWake
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 1466638765-2333694755
            • Opcode ID: eba9fc01b6a9d1c408c86e405b4f31a0f9db797720e7b3c72b65fd809337a6d6
            • Instruction ID: c5281b3530ad8cf4da98af7a50e64381a24a04f7aa6509f90975a97b03013922
            • Opcode Fuzzy Hash: eba9fc01b6a9d1c408c86e405b4f31a0f9db797720e7b3c72b65fd809337a6d6
            • Instruction Fuzzy Hash: 2221A222E0CAC642FB35BB15A4442BD2760AF44798F680031DF9DC77A1DFAEE54ACB50
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: NtWaitForKeyedEvent$ntdll
            • API String ID: 1646373207-2815205136
            • Opcode ID: 807cfb51dc01d980b4f2d185bdc6e465eb678390421a456197fafae7718a9404
            • Instruction ID: f39adf7a10394e050a03bbeae8a1f4ada7857f2e6b081b7bc07d3497e1c0d2a8
            • Opcode Fuzzy Hash: 807cfb51dc01d980b4f2d185bdc6e465eb678390421a456197fafae7718a9404
            • Instruction Fuzzy Hash: 79118121A1DB8181EA10FB01E8803556760FBD8798F644135EA8DC3B64EFBDD589CF00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: SetThreadDescription$kernel32
            • API String ID: 1646373207-1950310818
            • Opcode ID: 7ac23fb82f3bccca20251f2f2946cb3405ab1b6b01346f2d376141e90fb7919d
            • Instruction ID: 266b1f2eecb7005dcffffc66e3c965c1a4bb6740228a12f99d5fe24a3965f82f
            • Opcode Fuzzy Hash: 7ac23fb82f3bccca20251f2f2946cb3405ab1b6b01346f2d376141e90fb7919d
            • Instruction Fuzzy Hash: 3BE0ED18F0EA4281EE49BB16ED8416426616F98BD9F744536CE0DC3764EEEEA489CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: GetSystemTimePreciseAsFileTime$kernel32
            • API String ID: 1646373207-392834919
            • Opcode ID: 71d434fb3064ebe718e67f3467315527de2388df68e612c2c92abae684c1dec9
            • Instruction ID: 62e7ddcc14438a9e154e43808b56182c98e2ff97ee166351c2653f8fde6eefb5
            • Opcode Fuzzy Hash: 71d434fb3064ebe718e67f3467315527de2388df68e612c2c92abae684c1dec9
            • Instruction Fuzzy Hash: AEE09A14F0DA5291FE55FB55A8841B42260AF58B59FA44235CA0DC3360FFEEA55ACB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FileWrite$ConsoleErrorLastOutput
            • String ID:
            • API String ID: 2718003287-0
            • Opcode ID: 8875820102c5dbf4130b7a74e23a79fa082a0c67c06a05f52fd5a5adac179917
            • Instruction ID: d9dd7701e05cd0fa554dab28ed9a6d8e5abe5932736ac066618871a4e3b14372
            • Opcode Fuzzy Hash: 8875820102c5dbf4130b7a74e23a79fa082a0c67c06a05f52fd5a5adac179917
            • Instruction Fuzzy Hash: 00D1DE62F0CA8599E710EF65D4402AC37B1EB44BDCB204226CF5ED7B99DE79D40ACB00
            APIs
            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00007FF6421A611B,00000000), ref: 00007FF6421A624C
            • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00007FF6421A611B,00000000), ref: 00007FF6421A62D7
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ConsoleErrorLastMode
            • String ID:
            • API String ID: 953036326-0
            • Opcode ID: 6630e0d82ca14e8d4c24bbfd1099a455c0df43720e44df9b8894130ebf72bb4f
            • Instruction ID: 9309f1e201bf392bf5ecc5b414c84eceb0990cd502e52b3be07722a5d6e30abf
            • Opcode Fuzzy Hash: 6630e0d82ca14e8d4c24bbfd1099a455c0df43720e44df9b8894130ebf72bb4f
            • Instruction Fuzzy Hash: 4091A262F1C69195FB60BF6594402BD2BA0AB44B8CF344139DF4ED7685CFBAD44ACB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Heap$Free$CreateErrorLastProcessThread
            • String ID:
            • API String ID: 4090155190-0
            • Opcode ID: 82e06ff88743de9c6c97f8494ad63ea7dcc97d513f3791ecfca58220f22b5a38
            • Instruction ID: 39e5828e718f5b09cc55ecf577b12410f576ec2e20410652eea60e9c1351b8c5
            • Opcode Fuzzy Hash: 82e06ff88743de9c6c97f8494ad63ea7dcc97d513f3791ecfca58220f22b5a38
            • Instruction Fuzzy Hash: A131A536B08B4085F710AB62E8412AD6761BB88BE8F148535DF5CD3794DFBDD486C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CloseHandle$FileSleepWrite
            • String ID:
            • API String ID: 3423119723-0
            • Opcode ID: 5934cf6e98bb280f186700b8dddc855a85aba575023afbb02a5d7662604a1fda
            • Instruction ID: 0657adad5c16bd8e2048905c6280cfcf2bda60112da3ff7990787ab60b379f85
            • Opcode Fuzzy Hash: 5934cf6e98bb280f186700b8dddc855a85aba575023afbb02a5d7662604a1fda
            • Instruction Fuzzy Hash: E4315C22A08BC689E771BF3598407F927A1FB4479CF144132DE8CC7B99CEB99596DA00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CloseHandle$FileSleepWrite
            • String ID:
            • API String ID: 3423119723-0
            • Opcode ID: 61855a40b7052ffe6c97599b3f6ad9dc699b55571c0e9826dfff301eedf0bc9a
            • Instruction ID: b30578ac388c7c86722af41186050f9f57023e0e3bce46ccbc1583bd34d7c185
            • Opcode Fuzzy Hash: 61855a40b7052ffe6c97599b3f6ad9dc699b55571c0e9826dfff301eedf0bc9a
            • Instruction Fuzzy Hash: DA316C22A08BC688E771BF3598407F927A0FB4479CF144132DE8CC7B98CFB99196DA00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CloseHandle$FileSleepWrite
            • String ID:
            • API String ID: 3423119723-0
            • Opcode ID: abf077b8a892d9f4d2ec4466fc4b084af3ddada2ec041a1e4bdd095f7ea85d65
            • Instruction ID: eb60ad0c3fa1653ed1868a059ec3ca1b5ce709cec2c13b28e62c8c2d3f178d94
            • Opcode Fuzzy Hash: abf077b8a892d9f4d2ec4466fc4b084af3ddada2ec041a1e4bdd095f7ea85d65
            • Instruction Fuzzy Hash: 25314C22908BC688E771BF2598407F927A0FB4479DF544132EE8CC7B99CFB99596DB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FormatFreeHandleHeapMessageModule
            • String ID: }0x$Oskind$codemessage)HRESULT(
            • API String ID: 3599032235-664653352
            • Opcode ID: 0c24bde573fb928e6e20acccfad721a0c0bc7e11d230015bed9672254baf7f60
            • Instruction ID: f9790f36bdd3b7ac849e0ada9560cd978167fd220cce689b4536ae33d1d98081
            • Opcode Fuzzy Hash: 0c24bde573fb928e6e20acccfad721a0c0bc7e11d230015bed9672254baf7f60
            • Instruction Fuzzy Hash: 69413C26B1CA5685EB10FB61D4407AD2BB0AB88B8CF200136CF4D97B55CFBED645CB10
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: 0d8be27c9e3446b523b68380b9948fe79f6296bd376a8e569b0843d88f76d027
            • Instruction ID: d4c4911ddf23760092a5af3f3b190049cdbdf195e219c99819ede0fad61aa75b
            • Opcode Fuzzy Hash: 0d8be27c9e3446b523b68380b9948fe79f6296bd376a8e569b0843d88f76d027
            • Instruction Fuzzy Hash: 8F114C26B18F4189EB00EF60E8552A933A4FB19B5CF140A31DB6DC37A4DFB9D1698740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AcquireConditionExclusiveLockSleepVariable
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 97112084-2333694755
            • Opcode ID: 220088b57b201f3931872333218eb2fb876a27f4dd94a9847187041c9d5098ce
            • Instruction ID: 42582c8fe239ce99af6ff87ca3bca9092e9ff3d8f4332c46d2dcb76071f56ccc
            • Opcode Fuzzy Hash: 220088b57b201f3931872333218eb2fb876a27f4dd94a9847187041c9d5098ce
            • Instruction Fuzzy Hash: E851C122A0DB9181EB21BB15D4043792B60EB55B68F294236DFADC33D1DFBED489C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: Initialize_set_fmode
            • String ID: called `Result::unwrap()` on an `Err` value
            • API String ID: 3059891073-2333694755
            • Opcode ID: d43dd30a0cc37ce1ba64fbaf45ffb74524f7f6b049562404a014cef22b497bb7
            • Instruction ID: e24b398598eb648ab1ba4ba372f186712fa1b9e0692313862b4617db27e92ec0
            • Opcode Fuzzy Hash: d43dd30a0cc37ce1ba64fbaf45ffb74524f7f6b049562404a014cef22b497bb7
            • Instruction Fuzzy Hash: 2B518121E1C606C2EA487B7595552BD2361AF84788F240032EB4EC3B86DFAFE569CF41
            APIs
            Strings
            • use of std::thread::current() is not possible after the thread's local data has been destroyed, xrefs: 00007FF6421785E5
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: AddressCloseHandleWait
            • String ID: use of std::thread::current() is not possible after the thread's local data has been destroyed
            • API String ID: 592885855-1431102515
            • Opcode ID: d80228a26bcedfffe53632c8001855e7cce87a0c82cadc90cc9a3ee33dc584ce
            • Instruction ID: 5a13a2f274cc014116f4f239ecd8270ef49a39e0764e3a65840af0d292afeb7d
            • Opcode Fuzzy Hash: d80228a26bcedfffe53632c8001855e7cce87a0c82cadc90cc9a3ee33dc584ce
            • Instruction Fuzzy Hash: F651B026A09A4298FB11BB65EC407A92764BF8477CF654732DF2CC37D4DFBA94468700
            APIs
            Strings
            • <unnamed>, xrefs: 00007FF642191C32
            • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 00007FF642191CCE
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: LockRelease$ExclusiveShared
            • String ID: <unnamed>$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
            • API String ID: 279184637-616897820
            • Opcode ID: 7d7d2886259c6564fd32274b6c9a61a7df82f98bd851e4b0c2d984a148ae96df
            • Instruction ID: 69cff025291a219395726d4eb6a79e528565b04abaf08e7a4b5096bc81154605
            • Opcode Fuzzy Hash: 7d7d2886259c6564fd32274b6c9a61a7df82f98bd851e4b0c2d984a148ae96df
            • Instruction Fuzzy Hash: AD514636A0DA8188EB51BF65D4802B837A1BB58B8CF644032DF4DC37A5DFAEE455CB41
            APIs
            Strings
            • <unnamed>, xrefs: 00007FF642191C32
            • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 00007FF642191CCE
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: LockRelease$ExclusiveShared
            • String ID: <unnamed>$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
            • API String ID: 279184637-616897820
            • Opcode ID: 39ae95b467ac9e5c7c66673b6c0d11df1c5937850569e09270ca9a3b12895e96
            • Instruction ID: 910c5830d5a44afba1f5eda5eb62fc7eee21d6341fc31938065a26562b7f4a1a
            • Opcode Fuzzy Hash: 39ae95b467ac9e5c7c66673b6c0d11df1c5937850569e09270ca9a3b12895e96
            • Instruction Fuzzy Hash: BC512636A0DA8188EB51BF65D4802B837A1BB58B8CF644032DB4DC37A5DFAAE455CB41
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ErrorFileLastWrite
            • String ID: U
            • API String ID: 442123175-4171548499
            • Opcode ID: 3ff687fd7e7d8f1f2e5c4389899c042159ca8b4cc9ce9a172e96bb05df430e88
            • Instruction ID: 0350e0a8ca09fa0947242d2f0f90173d27e75eec054fc6d6c8eaf26a51cb4efb
            • Opcode Fuzzy Hash: 3ff687fd7e7d8f1f2e5c4389899c042159ca8b4cc9ce9a172e96bb05df430e88
            • Instruction Fuzzy Hash: F241A262B1CA8196DB20AF65E4443AA6760FB84BD8F604031EF4EC7798EFBDD445CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: ExceptionFileHeaderRaise
            • String ID: csm
            • API String ID: 2573137834-1018135373
            • Opcode ID: 883a0065c4fa0e1550a9946e3da064db8281e95a61c9c5dd8f7c9e5845b28b3d
            • Instruction ID: af73cb3472e60f62c48854bb458d8aebee45c79040e2a26c79a021e8359dc30d
            • Opcode Fuzzy Hash: 883a0065c4fa0e1550a9946e3da064db8281e95a61c9c5dd8f7c9e5845b28b3d
            • Instruction Fuzzy Hash: 25114C32608B4182EB60AF15E400269B7E4FB98B98F684270DF8C87758DF7DD551CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID:
            • API String ID: 3298025750-0
            • Opcode ID: 3d27bfe1a79bc11b3a63879303dfb2ae74f8945ce12e4f151717bd9fb5bb8369
            • Instruction ID: 1b2192686fbdd3d61aa85577cc2b883ee5ac18e159214c1253c97850d7a9d735
            • Opcode Fuzzy Hash: 3d27bfe1a79bc11b3a63879303dfb2ae74f8945ce12e4f151717bd9fb5bb8369
            • Instruction Fuzzy Hash: 0FA19C22A0CBC589E721AF35D8403F927A2FB5578CF549231DB8D8B65ADFB9E185C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID:
            • API String ID: 3298025750-0
            • Opcode ID: abce01e59cf06bfddaaed37fe6e2481b8dda4bdcb6d2153c5bcf55c26926d91f
            • Instruction ID: 2a571b7eddac739a677b8df74e8f09e3a60840c53def4d691a4be2186f4c0ef9
            • Opcode Fuzzy Hash: abce01e59cf06bfddaaed37fe6e2481b8dda4bdcb6d2153c5bcf55c26926d91f
            • Instruction Fuzzy Hash: 41413F26A0DA41D5E725BF12A94076AA760FB48BD8F684031CF4ED7754DF7EE4A1CB00
            Memory Dump Source
            • Source File: 00000000.00000002.2174606487.00007FF642161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF642160000, based on PE: true
            • Associated: 00000000.00000002.2174589767.00007FF642160000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174642367.00007FF6421AD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174668192.00007FF6421CC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2174685693.00007FF6421CE000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff642160000_praxisbackup.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0baaba98fa9066360a80adca798b99bf6d1efd932463139389e9b9ad12c29d50
            • Instruction ID: 5e1c08b2468b18792e072a4f8dfc89235a16a5dfd2efa8d16c6391d32b98bbf7
            • Opcode Fuzzy Hash: 0baaba98fa9066360a80adca798b99bf6d1efd932463139389e9b9ad12c29d50
            • Instruction Fuzzy Hash: 1A514236A0CA8281E764FB46E49837D7361EB85B88F655071CB4DC36A4CFBED486CB41